Rule Library

Sigma Rules

9 rules found for "juju4"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Suspicious SQL Query

Detects suspicious SQL query keywrods that are often used during recon, exfiltration or destructive activities. Such as dropping tables and selecting wildcard fields

database
TA0010 · ExfiltrationTA0001 · Initial AccessTA0004 · Privilege EscalationTA0003 · Persistence+2
@juju4Tue Dec 27category
Detectionlowtest

Admin User Remote Logon

Detect remote login by Administrator user (depending on internal pattern).

Windowssecurity
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0008 · Lateral Movement+5
juju4Sun Oct 29windows
Detectionmediumtest

Suspicious RASdial Activity

Detects suspicious process related to rasdial.exe

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059 · Command and Scripting Interpreter
juju4Wed Jan 16windows
Detectionmediumtest

Suspicious Process Start Locations

Detects suspicious process run from unusual locations

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading2013-05-002 · CAR 2013-05-002
juju4+2Wed Jan 16windows
Detectionmediumtest

Potentially Suspicious Rundll32 Activity

Detects suspicious execution of rundll32, with specific calls to some DLLs with known LOLBIN functionalities

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32
juju4+3Wed Jan 16windows
Detectionmediumtest

Potential Commandline Obfuscation Using Escape Characters

Detects potential commandline obfuscation using known escape characters

WindowsProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
juju4Tue Dec 11windows
Detectionmediumtest

Potential RDP Session Hijacking Activity

Detects potential RDP Session Hijacking activity on Windows systems

WindowsProcess Creation
TA0002 · Execution
@juju4Tue Dec 27windows
Detectionmediumtest

New Process Created Via Wmic.EXE

Detects new process creation using WMIC via the "process call create" flag

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management Instrumentation2016-03-002 · CAR 2016-03-002
Michael Haag+3Wed Jan 16windows
Detectionmediumtest

Potential Product Class Reconnaissance Via Wmic.EXE

Detects the execution of WMIC in order to get a list of firewall, antivirus and antispywware products. Adversaries often enumerate security products installed on a system to identify security controls and potential ways to evade detection or disable protection mechanisms. This information helps them plan their next attack steps and choose appropriate techniques to bypass security measures.

WindowsProcess Creation
TA0002 · ExecutionT1047 · Windows Management InstrumentationTA0007 · DiscoveryT1082 · System Information Discovery
Michael Haag+4Tue Feb 14windows