Rule Library

Sigma Rules

9 rules found for "Zach Stanford"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Suspicious Remote Logon with Explicit Credentials

Detects suspicious processes logging on with explicit credentials

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+2
oscd.community+3Mon Oct 05windows
Detectionmediumtest

Root Certificate Installed - PowerShell

Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.

WindowsPowerShell Script
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
oscd.community+1Sat Oct 10windows
Detectionmediumtest

PowerShell Deleted Mounted Share

Detects when when a mounted share is removed. Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation

WindowsPowerShell Script
TA0005 · Defense EvasionT1070.005 · Network Share Connection Removal
oscd.community+1Thu Oct 08windows
Detectionmediumtest

New Root Certificate Installed Via CertMgr.EXE

Detects execution of "certmgr" with the "add" flag in order to install a new certificate on the system. Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.

WindowsProcess Creation
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
oscd.community+1Sun Mar 05windows
Detectionmediumtest

New Root Certificate Installed Via Certutil.EXE

Detects execution of "certutil" with the "addstore" flag in order to install a new certificate on the system. Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.

WindowsProcess Creation
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
oscd.community+1Sun Mar 05windows
Detectionlowtest

Unmount Share Via Net.EXE

Detects when when a mounted share is removed. Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation

WindowsProcess Creation
TA0005 · Defense EvasionT1070.005 · Network Share Connection Removal
oscd.community+1Thu Oct 08windows
Detectionmediumtest

Windows Admin Share Mount Via Net.EXE

Detects when an admin share is mounted using net.exe

WindowsProcess Creation
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
oscd.community+3Mon Oct 05windows
Detectionmediumtest

Copy From Or To Admin Share Or Sysvol Folder

Detects a copy command or a copy utility execution to or from an Admin share or remote

WindowsProcess Creation
TA0008 · Lateral MovementTA0009 · CollectionTA0010 · ExfiltrationT1039 · Data from Network Shared Drive+2
Florian Roth (Nextron Systems)+4Mon Dec 30windows
Detectionhightest

Suspicious Process By Web Server Process

Detects potentially suspicious processes being spawned by a web server process which could be the result of a successfully placed web shell or exploitation

WindowsProcess Creation
TA0003 · PersistenceTA0001 · Initial AccessT1505.003 · Web ShellT1190 · Exploit Public-Facing Application
Thomas Patzke+4Wed Jan 16windows