Rule Library

Sigma Rules

57 rules found for "X__Junior (Nextron Systems)"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Malware User Agent

Detects suspicious user agent strings used by malware in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)+2Sat Jul 08web
Detectionmediumtest

Access To Crypto Currency Wallets By Uncommon Applications

Detects file access requests to crypto currency files by uncommon processes. Could indicate potential attempt of crypto currency wallet stealing.

Windowsfile_access
T1003 · OS Credential DumpingTA0006 · Credential Access
X__Junior (Nextron Systems)Mon Jul 29windows
Detectionlowexperimental

Suspicious File Access to Browser Credential Storage

Detects file access to browser credential storage paths by non-browser processes, which may indicate credential access attempts. Adversaries may attempt to access browser credential storage to extract sensitive information such as usernames and passwords or cookies. This behavior is often commonly observed in credential stealing malware.

Windowsfile_access
TA0006 · Credential AccessT1555.003 · Credentials from Web BrowsersTA0007 · DiscoveryT1217 · Browser Information Discovery
François Hubaut+3Thu May 22windows
Detectionhightest

Suspicious File Creation Activity From Fake Recycle.Bin Folder

Detects file write event from/to a fake recycle bin folder that is often used as a staging directory for malware

WindowsFile Event
TA0003 · PersistenceTA0005 · Defense Evasion
X__Junior (Nextron Systems)Wed Jul 12windows
Detectionhightest

Abusable DLL Potential Sideloading From Suspicious Location

Detects potential DLL sideloading of DLLs that are known to be abused from suspicious locations

WindowsImage Load (DLL)
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
X__Junior (Nextron Systems)Tue Jul 11windows
Detectionhightest

Potential appverifUI.DLL Sideloading

Detects potential DLL sideloading of "appverifUI.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Tue Jun 20windows
Detectionmediumtest

Potential AVKkid.DLL Sideloading

Detects potential DLL sideloading of "AVKkid.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Thu Aug 03windows
Detectionmediumtest

Potential CCleanerDU.DLL Sideloading

Detects potential DLL sideloading of "CCleanerDU.dll"

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Thu Jul 13windows
Detectionhightest

Potential EACore.DLL Sideloading

Detects potential DLL sideloading of "EACore.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Thu Aug 03windows
Detectionhightest

Potential Edputil.DLL Sideloading

Detects potential DLL sideloading of "edputil.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Fri Jun 09windows
Detectionmediumtest

Potential Goopdate.DLL Sideloading

Detects potential DLL sideloading of "goopdate.dll", a DLL used by googleupdate.exe

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)+1Mon May 15windows
Detectionhightest

Potential Iviewers.DLL Sideloading

Detects potential DLL sideloading of "iviewers.dll" (OLE/COM Object Interface Viewer)

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Tue Mar 21windows
Detectionhightest

Potential Rcdll.DLL Sideloading

Detects potential DLL sideloading of rcdll.dll

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Mon Mar 13windows
Detectionmediumtest

Potential RjvPlatform.DLL Sideloading From Default Location

Detects loading of "RjvPlatform.dll" by the "SystemResetPlatform.exe" binary which can be abused as a method of DLL side loading since the "$SysReset" directory isn't created by default.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Fri Jun 09windows
Detectionhightest

Potential RjvPlatform.DLL Sideloading From Non-Default Location

Detects potential DLL sideloading of "RjvPlatform.dll" by "SystemResetPlatform.exe" located in a non-default location.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Fri Jun 09windows
Detectionmediumtest

Potential RoboForm.DLL Sideloading

Detects potential DLL sideloading of "roboform.dll", a DLL used by RoboForm Password Manager

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)+1Sun May 14windows
Detectionmediumtest

Potential ShellDispatch.DLL Sideloading

Detects potential DLL sideloading of "ShellDispatch.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Tue Jun 20windows
Detectionhightest

Potential SmadHook.DLL Sideloading

Detects potential DLL sideloading of "SmadHook.dll", a DLL used by SmadAV antivirus

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Thu Jun 01windows
Detectionmediumtest

Potential SolidPDFCreator.DLL Sideloading

Detects potential DLL sideloading of "SolidPDFCreator.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Sun May 07windows
Detectionmediumtest

Potential Vivaldi_elf.DLL Sideloading

Detects potential DLL sideloading of "vivaldi_elf.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Thu Aug 03windows
Detectionhightest

Potential Waveedit.DLL Sideloading

Detects potential DLL sideloading of "waveedit.dll", which is part of the Nero WaveEditor audio editing software.

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Wed Jun 14windows
Detectionmediumtest

Potential Wazuh Security Platform DLL Sideloading

Detects potential DLL side loading of DLLs that are part of the Wazuh security platform

WindowsImage Load (DLL)
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Mon Mar 13windows
Detectionmediumtest

Potential WWlib.DLL Sideloading

Detects potential DLL sideloading of "wwlib.dll"

WindowsImage Load (DLL)
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationT1574.001 · DLL Search Order Hijacking
X__Junior (Nextron Systems)Thu May 18windows
Detectionhightest

New Connection Initiated To Potential Dead Drop Resolver Domain

Detects an executable, which is not an internet browser or known application, initiating network connections to legit popular websites, which were seen to be used as dead drop resolvers in previous attacks. In this context attackers leverage known websites such as "facebook", "youtube", etc. In order to pass through undetected.

WindowsNetwork Connection
TA0011 · Command and ControlT1102 · Web ServiceT1102.001 · Dead Drop Resolver
Sorina Ionescu+1Wed Aug 17windows
Detectionmediumtest

Office Application Initiated Network Connection Over Uncommon Ports

Detects an office suit application (Word, Excel, PowerPoint, Outlook) communicating to target systems over uncommon ports.

WindowsNetwork Connection
TA0005 · Defense EvasionTA0011 · Command and Control
X__Junior (Nextron Systems)+1Wed Jul 12windows
Detectionmediumtest

Suspicious Wordpad Outbound Connections

Detects a network connection initiated by "wordpad.exe" over uncommon destination ports. This might indicate potential process injection activity from a beacon or similar mechanisms.

WindowsNetwork Connection
TA0005 · Defense EvasionTA0011 · Command and Control
X__Junior (Nextron Systems)Wed Jul 12windows
Detectionmediumtest

Chromium Browser Instance Executed With Custom Extension

Detects a Chromium based browser process with the 'load-extension' flag to start a instance with a custom extension

WindowsProcess Creation
TA0003 · Persistenceattack.t1176.001
Aedan Russell+2Sun Jun 19windows
Detectionhightest

Chromium Browser Headless Execution To Mockbin Like Site

Detects the execution of a Chromium based browser process with the "headless" flag and a URL pointing to the mockbin.org service (which can be used to exfiltrate data).

WindowsProcess Creation
TA0002 · Execution
X__Junior (Nextron Systems)Mon Sep 11windows
Detectionhightest

Suspicious Chromium Browser Instance Executed With Custom Extension

Detects a suspicious process spawning a Chromium based browser process with the 'load-extension' flag to start an instance with a custom extension

WindowsProcess Creation
TA0003 · Persistenceattack.t1176.001
Aedan Russell+2Sun Jun 19windows
Detectionmediumtest

Greedy File Deletion Using Del

Detects execution of the "del" builtin command to remove files using greedy/wildcard expression. This is often used by malware to delete content of folders that perhaps contains the initial malware infection or to delete evidence.

WindowsProcess Creation
TA0005 · Defense EvasionT1070.004 · File Deletion
François Hubaut+1Thu Dec 02windows
Detectionmediumtest

Potentially Suspicious Ping/Copy Command Combination

Detects uncommon and potentially suspicious one-liner command containing both "ping" and "copy" at the same time, which is usually used by malware.

WindowsProcess Creation
TA0005 · Defense EvasionT1070.004 · File Deletion
X__Junior (Nextron Systems)Tue Jul 18windows
Detectionmediumtest

Dynamic .NET Compilation Via Csc.EXE

Detects execution of "csc.exe" to compile .NET code. Attackers often leverage this to compile code on the fly and use it in other stages.

WindowsProcess Creation
TA0005 · Defense EvasionT1027.004 · Compile After Delivery
Florian Roth (Nextron Systems)+1Sat Aug 24windows
Detectionhightest

Csc.EXE Execution Form Potentially Suspicious Parent

Detects a potentially suspicious parent of "csc.exe", which could be a sign of payload delivery.

WindowsProcess Creation
TA0002 · ExecutionT1059.005 · Visual BasicT1059.007 · JavaScriptTA0005 · Defense Evasion+2
Florian Roth (Nextron Systems)+2Mon Feb 11windows
Detectionmediumtest

Insecure Transfer Via Curl.EXE

Detects execution of "curl.exe" with the "--insecure" flag.

WindowsProcess Creation
TA0002 · Execution
X__Junior (Nextron Systems)Fri Jun 30windows
Detectionmediumtest

Potentially Suspicious Cabinet File Expansion

Detects the expansion or decompression of cabinet files from potentially suspicious or uncommon locations, e.g. seen in Iranian MeteorExpress related attacks

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Bhabesh Raj+1Fri Jul 30windows
Detectionhightest

File Encryption/Decryption Via Gpg4win From Suspicious Locations

Detects usage of Gpg4win to encrypt/decrypt files located in potentially suspicious locations.

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)+1Wed Nov 30windows
Detectionmediumtest

Firewall Rule Update Via Netsh.EXE

Detects execution of netsh with the "advfirewall" and the "set" option in order to set new values for properties of a existing rule

WindowsProcess Creation
TA0005 · Defense Evasion
X__Junior (Nextron Systems)Tue Jul 18windows
Detectionhightest

PowerShell Execution With Potential Decryption Capabilities

Detects PowerShell commands that decrypt an ".LNK" "file to drop the next stage of the malware.

WindowsProcess Creation
TA0002 · Execution
X__Junior (Nextron Systems)+1Fri Jun 30windows
Detectionhightest

PUA - PingCastle Execution From Potentially Suspicious Parent

Detects the execution of PingCastle, a tool designed to quickly assess the Active Directory security level via a script located in a potentially suspicious or uncommon location.

WindowsProcess Creation
TA0043 · ReconnaissanceT1595 · Active Scanning
Nasreddine Bencherchali (Nextron Systems)+1Thu Jan 11windows
Detectionhightest

Suspicious Greedy Compression Using Rar.EXE

Detects RAR usage that creates an archive from a suspicious folder, either a system folder or one of the folders often used by attackers for staging purposes

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
X__Junior (Nextron Systems)+1Thu Dec 15windows
Detectionmediumtest

Renamed CURL.EXE Execution

Detects the execution of a renamed "CURL.exe" binary based on the PE metadata fields

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0005 · Defense EvasionT1202 · Indirect Command Execution
X__Junior (Nextron Systems)Mon Sep 11windows
Detectionhightest

Renamed NirCmd.EXE Execution

Detects the execution of a renamed "NirCmd.exe" binary based on the PE metadata fields.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0005 · Defense EvasionT1202 · Indirect Command Execution
X__Junior (Nextron Systems)Mon Mar 11windows
Detectionhightest

Renamed PingCastle Binary Execution

Detects the execution of a renamed "PingCastle" binary based on the PE metadata fields.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0005 · Defense EvasionT1202 · Indirect Command Execution
Nasreddine Bencherchali (Nextron Systems)+1Thu Jan 11windows
Detectionmediumtest

Potential ShellDispatch.DLL Functionality Abuse

Detects potential "ShellDispatch.dll" functionality abuse to execute arbitrary binaries via "ShellExecute"

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasion
X__Junior (Nextron Systems)Tue Jun 20windows
Detectionmediumtest

Scheduled Task Executing Payload from Registry

Detects the creation of a schtasks that potentially executes a payload stored in the Windows Registry using PowerShell.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
X__Junior (Nextron Systems)+1Tue Jul 18windows
Detectionhightest

Scheduled Task Executing Encoded Payload from Registry

Detects the creation of a schtask that potentially executes a base64 encoded payload stored in the Windows Registry using PowerShell.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+1
Martin Mueller+3Sat Feb 12windows
Detectionmediumtest

Uncommon Child Processes Of SndVol.exe

Detects potentially uncommon child processes of SndVol.exe (the Windows volume mixer)

WindowsProcess Creation
TA0002 · Execution
X__Junior (Nextron Systems)Fri Jun 09windows
Detectionmediumtest

Potentially Suspicious EventLog Recon Activity Using Log Query Utilities

Detects execution of different log query utilities and commands to search and dump the content of specific event logs or look for specific event IDs. This technique is used by threat actors in order to extract sensitive information from events logs such as usernames, IP addresses, hostnames, etc.

WindowsProcess Creation
TA0006 · Credential AccessTA0007 · DiscoveryT1552 · Unsecured CredentialsT1087 · Account Discovery
Nasreddine Bencherchali (Nextron Systems)+1Fri Sep 09windows