Rule Library

Sigma Rules

39 rules found for "kostastsale"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhighexperimental

Suspicious Filename with Embedded Base64 Commands

Detects files with specially crafted filenames that embed Base64-encoded bash payloads designed to execute when processed by shell scripts. These filenames exploit shell interpretation quirks to trigger hidden commands, a technique observed in VShell malware campaigns.

LinuxFile Event
TA0002 · ExecutionT1059.004 · Unix ShellTA0005 · Defense EvasionT1027 · Obfuscated Files or Information
kostastsaleSat Nov 22linux
Detectionmediumtest

Kerberoasting Activity - Initial Query

This rule will collect the data needed to start looking into possible kerberoasting activity. Further analysis or computation within the query is needed focusing on requests from one specific host/IP towards multiple service names within a time period of 5 seconds. You can then set a threshold for the number of requests and time between the requests to turn this into an alert.

Windowssecurity
TA0006 · Credential AccessT1558.003 · Kerberoasting
kostastsaleFri Jan 21windows
Detectionmediumexperimental

Potentially Suspicious File Creation by OpenEDR's ITSMService

Detects the creation of potentially suspicious files by OpenEDR's ITSMService process. The ITSMService is responsible for remote management operations and can create files on the system through the Process Explorer or file management features. While legitimate for IT operations, creation of executable or script files could indicate unauthorized file uploads, data staging, or malicious file deployment.

WindowsFile Event
TA0011 · Command and ControlT1105 · Ingress Tool TransferTA0008 · Lateral MovementT1570 · Lateral Tool Transfer+1
kostastsaleThu Feb 19windows
Detectionmediumtest

Uncommon Connection to Active Directory Web Services

Detects uncommon network connections to the Active Directory Web Services (ADWS) from processes not typically associated with ADWS management.

WindowsNetwork Connection
TA0007 · DiscoveryT1087 · Account Discovery
kostastsaleFri Jan 26windows
Detectionmediumexperimental

OpenEDR Spawning Command Shell

Detects the OpenEDR ssh-shellhost.exe spawning a command shell (cmd.exe) or PowerShell with PTY (pseudo-terminal) capabilities. This may indicate remote command execution through OpenEDR's remote management features, which could be legitimate administrative activity or potential abuse of the remote access tool. Threat actors may leverage OpenEDR's remote shell capabilities to execute commands on compromised systems, facilitating lateral movement or other command-and-control operations.

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command ShellTA0008 · Lateral MovementT1021.004 · SSH+2
kostastsaleThu Feb 19windows
Detectionhightest

File Explorer Folder Opened Using Explorer Folder Shortcut Via Shell

Detects the initial execution of "cmd.exe" which spawns "explorer.exe" with the appropriate command line arguments for opening the "My Computer" folder.

WindowsProcess Creation
TA0007 · DiscoveryT1135 · Network Share Discovery
kostastsaleThu Dec 22windows
Detectionhightest

HackTool - SharpWSUS/WSUSpendu Execution

Detects the execution of SharpWSUS or WSUSpendu, utilities that allow for lateral movement through WSUS. Windows Server Update Services (WSUS) is a critical component of Windows systems and is frequently configured in a way that allows an attacker to circumvent internal networking limitations.

WindowsProcess Creation
TA0002 · ExecutionTA0008 · Lateral MovementT1210 · Exploitation of Remote Services
kostastsale+1Fri Oct 07windows
Detectionhightest

HackTool - SOAPHound Execution

Detects the execution of SOAPHound, a .NET tool for collecting Active Directory data, using specific command-line arguments that may indicate an attempt to extract sensitive AD information.

WindowsProcess Creation
TA0007 · DiscoveryT1087 · Account Discovery
kostastsaleFri Jan 26windows
Detectionhightest

OneNote.EXE Execution of Malicious Embedded Scripts

Detects the execution of malicious OneNote documents that contain embedded scripts. When a user clicks on a OneNote attachment and then on the malicious link inside the ".one" file, it exports and executes the malicious embedded script from specific directories.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.001 · Compiled HTML File
kostastsaleThu Feb 02windows
Detectionhightest

Obfuscated PowerShell OneLiner Execution

Detects the execution of a specific OneLiner to download and execute powershell modules in memory.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1059.001 · PowerShellT1562.001 · Disable or Modify Tools
kostastsale+1Mon May 09windows
Detectionhightest

Python Function Execution Security Warning Disabled In Excel

Detects changes to the registry value "PythonFunctionWarnings" that would prevent any warnings or alerts from showing when Python functions are about to be executed. Threat actors could run malicious code through the new Microsoft Excel feature that allows Python to run within the spreadsheet.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
kostastsaleTue Aug 22windows
Detectionmediumtest

Hiding User Account Via SpecialAccounts Registry Key - CommandLine

Detects changes to the registry key "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist" where the value is set to "0" in order to hide user account from being listed on the logon screen.

WindowsProcess Creation
TA0005 · Defense EvasionT1564.002 · Hidden Users
kostastsale+1Sat May 14windows
Detectionmediumtest

Remote Access Tool - MeshAgent Command Execution via MeshCentral

Detects the use of MeshAgent to execute commands on the target host, particularly when threat actors might abuse it to execute commands directly. MeshAgent can execute commands on the target host by leveraging win-console to obscure their activities and win-dispatcher to run malicious code through IPC with child processes.

WindowsProcess Creation
TA0011 · Command and Controlattack.t1219.002
kostastsaleSun Sep 22windows
Detectionmediumtest

Renamed CURL.EXE Execution

Detects the execution of a renamed "CURL.exe" binary based on the PE metadata fields

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0005 · Defense EvasionT1202 · Indirect Command Execution
X__Junior (Nextron Systems)Mon Sep 11windows
Detectionmediumtest

Potentially Suspicious Rundll32.EXE Execution of UDL File

Detects the execution of rundll32.exe with the oledb32.dll library to open a UDL file. Threat actors can abuse this technique as a phishing vector to capture authentication credentials or other sensitive data.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionTA0011 · Command and ControlT1218.011 · Rundll32+1
kostastsaleFri Aug 16windows
Detectionhightest

Sdiagnhost Calling Suspicious Child Process

Detects sdiagnhost.exe calling a suspicious child process (e.g. used in exploits for Follina / CVE-2022-30190)

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1218 · System Binary Proxy Execution
kostastsaleWed Jun 01windows
Detectionhightest

Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 1

Detects the usage of emojis in the command line, this could be a sign of potential defense evasion activity.

WindowsProcess Creation
TA0005 · Defense Evasion
kostastsale+1Mon Dec 05windows
Detectionhightest

Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 2

Detects the usage of emojis in the command line, this could be a sign of potential defense evasion activity.

WindowsProcess Creation
TA0005 · Defense Evasion
kostastsale+1Mon Dec 05windows
Detectionhightest

Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 3

Detects the usage of emojis in the command line, this could be a sign of potential defense evasion activity.

WindowsProcess Creation
TA0005 · Defense Evasion
kostastsale+1Mon Dec 05windows
Detectionhightest

Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 4

Detects the usage of emojis in the command line, this could be a sign of potential defense evasion activity.

WindowsProcess Creation
TA0005 · Defense Evasion
kostastsale+1Mon Dec 05windows
Detectionhightest

Antivirus Filter Driver Disallowed On Dev Drive - Registry

Detects activity that indicates a user disabling the ability for Antivirus mini filter to inspect a "Dev Drive".

WindowsRegistry Set
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
kostastsale+1Sun Nov 05windows
Emerging Threathightest

Exploitation Attempt Of CVE-2020-1472 - Execution of ZeroLogon PoC

Detects the execution of the commonly used ZeroLogon PoC executable.

WindowsProcess Creation
TA0002 · ExecutionTA0008 · Lateral MovementT1210 · Exploitation of Remote Servicescve.2020-1472+1
kostastsale+1Sat Feb 122020
Emerging Threathightest

Potential CVE-2021-44228 Exploitation Attempt - VMware Horizon

Detects potential initial exploitation attempts against VMware Horizon deployments running a vulnerable versions of Log4j.

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2021-44228detection.emerging-threats
kostastsaleFri Jan 142021
Emerging Threatmediumtest

Potential CVE-2022-22954 Exploitation Attempt - VMware Workspace ONE Access Remote Code Execution

Detects potential exploitation attempt of CVE-2022-22954, a remote code execution vulnerability in VMware Workspace ONE Access and Identity Manager. As reported by Morphisec, part of the attack chain, threat actors used PowerShell commands that executed as a child processes of the legitimate Tomcat "prunsrv.exe" process application.

WindowsProcess Creation
TA0002 · ExecutionTA0001 · Initial AccessT1059.006 · PythonT1190 · Exploit Public-Facing Application+2
kostastsaleMon Apr 252022
Emerging Threathightest

ChromeLoader Malware Execution

Detects execution of ChromeLoader malware via a registered scheduled task

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+3
kostastsaleMon Jan 102022
Emerging Threathightest

Emotet Loader Execution Via .LNK File

Detects the Emotet Epoch4 loader as reported by @malware_traffic back in 2022. The ".lnk" file was delivered via phishing campaign.

WindowsProcess Creation
TA0002 · ExecutionT1059.006 · Pythondetection.emerging-threats
kostastsaleFri Apr 222022
Emerging Threathightest

Raspberry Robin Subsequent Execution of Commands

Detects raspberry robin subsequent execution of commands.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
kostastsaleFri May 062022
Emerging Threathightest

Raspberry Robin Initial Execution From External Drive

Detects the initial execution of the Raspberry Robin malware from an external drive using "Cmd.EXE".

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
kostastsaleFri May 062022
Emerging Threathightest

Serpent Backdoor Payload Execution Via Scheduled Task

Detects post exploitation execution technique of the Serpent backdoor. According to Proofpoint, one of the commands that the backdoor ran was via creating a temporary scheduled task using an unusual method. It creates a fictitious windows event and a trigger in which once the event is created, it executes the payload.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.005 · Scheduled Task+2
kostastsaleMon Mar 212022
Emerging Threathightest

FakeUpdates/SocGholish Activity

Detects initial execution of FakeUpdates/SocGholish malware via wscript that later executes commands via cmd or powershell.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShelldetection.emerging-threats
kostastsaleThu Jun 162022
Emerging Threatmediumtest

Potential MOVEit Transfer CVE-2023-34362 Exploitation - Dynamic Compilation Via Csc.EXE

Detects the execution of "csc.exe" via "w3wp.exe" process. MOVEit affected hosts execute "csc.exe" via the "w3wp.exe" process to dynamically compile malicious DLL files. MOVEit is affected by a critical vulnerability. Exploited hosts show evidence of dynamically compiling a DLL and writing it under C:\\Windows\\Microsoft\.NET\\Framework64\\v4\.0\.30319\\Temporary ASP\.NET Files\\root\\([a-z0-9]{5,12})\\([a-z0-9]{5,12})\\App_Web_[a-z0-9]{5,12}\.dll. Hunting Opportunity Events from IIS dynamically compiling binaries via the csc.exe on behalf of the MOVEit application, especially since May 27th should be investigated.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpretercve.2023-34362detection.emerging-threats
kostastsaleThu Jun 012023
Emerging Threathightest

Injected Browser Process Spawning Rundll32 - GuLoader Activity

Detects the execution of installed GuLoader malware on the host. GuLoader is initiating network connections via the rundll32.exe process that is spawned via a browser parent(injected) process.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055 · Process Injectiondetection.emerging-threats
kostastsaleMon Aug 072023
Emerging Threathightest

Ursnif Redirection Of Discovery Commands

Detects the redirection of Ursnif discovery commands as part of the initial execution of the malware.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
kostastsaleSun Jul 162023
Threat Huntlowexperimental

Potentially Suspicious Long Filename Pattern - Linux

Detects the creation of files with unusually long filenames (100 or more characters), which may indicate obfuscation techniques used by malware such as VShell. This is a hunting rule to identify potential threats that use long filenames to evade detection. Keep in mind that on a legitimate system, such long filenames can and are common. Run this detection in the context of threat hunting rather than alerting. Adjust the threshold of filename length as needed based on your environment.

LinuxFile Event
TA0002 · ExecutionT1059.004 · Unix ShellTA0005 · Defense EvasionT1027 · Obfuscated Files or Information+1
kostastsaleSat Nov 22linux
Threat Huntmediumtest

Remote Access Tool - Action1 Arbitrary Code Execution and Remote Sessions

Detects the execution of Action1 in order to execute arbitrary code or establish a remote session. Action1 is a powerful Remote Monitoring and Management tool that enables users to execute commands, scripts, and binaries. Through the web interface of action1, the administrator must create a new policy or an app to establish remote execution and then points that the agent is installed. Hunting Opportunity 1- Weed Out The Noise When threat actors execute a script, a command, or a binary through these new policies and apps, the names of these become visible in the command line during the execution process. Below is an example of the command line that contains the deployment of a binary through a policy with name "test_app_1": ParentCommandLine: "C:\WINDOWS\Action1\action1_agent.exe schedule:Deploy_App__test_app_1_1681327673425 runaction:0" After establishing a baseline, we can split the command to extract the policy name and group all the policy names and inspect the results with a list of frequency occurrences. Hunting Opportunity 2 - Remote Sessions On Out Of Office Hours If you have admins within your environment using remote sessions to administer endpoints, you can create a threat-hunting query and modify the time of the initiated sessions looking for abnormal activity.

WindowsProcess Creation
TA0011 · Command and Controlattack.t1219.002detection.threat-hunting
kostastsaleThu Apr 13windows
Threat Huntmediumtest

Remote Access Tool - Ammy Admin Agent Execution

Detects the execution of the Ammy Admin RMM agent for remote management.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · Persistencedetection.threat-hunting
kostastsaleMon Aug 05windows
Threat Huntmediumtest

Remote Access Tool - Cmd.EXE Execution via AnyViewer

Detects execution of "cmd.exe" via the AnyViewer RMM agent on a remote management sessions.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · Persistencedetection.threat-hunting
kostastsaleSat Aug 03windows
Threat Huntlowtest

Potential Suspicious Execution From GUID Like Folder Names

Detects potential suspicious execution of a GUID like folder name located in a suspicious location such as %TEMP% as seen being used in IcedID attacks. Use this rule to hunt for potentially suspicious activity stemming from uncommon folders.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Informationdetection.threat-hunting
Nasreddine Bencherchali (Nextron Systems)Thu Sep 01windows
Threat Huntmediumtest

Manual Execution of Script Inside of a Compressed File

This is a threat-hunting query to collect information related to the interactive execution of a script from inside a compressed file (zip/rar). Windows will automatically run the script using scripting interpreters such as wscript and cscript binaries. From the query below, the child process is the script interpreter that will execute the script. The script extension is also a set of standard extensions that Windows OS recognizes. Selections 1-3 contain three different execution scenarios. 1. Compressed file opened using 7zip. 2. Compressed file opened using WinRar. 3. Compressed file opened using native windows File Explorer capabilities. When the malicious script is double-clicked, it will be extracted to the respected directories as signified by the CommandLine on each of the three Selections. It will then be executed using the relevant script interpreter."

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.threat-hunting
kostastsaleWed Feb 15windows