Rule Library

Sigma Rules

4 rules found for "mttaggart"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionlowtest

Potentially Suspicious Network Connection To Notion API

Detects a non-browser process communicating with the Notion API. This could indicate potential use of a covert C2 channel such as "OffensiveNotion C2"

WindowsNetwork Connection
TA0011 · Command and ControlT1102 · Web Service
Gavin KnappWed May 03windows
Detectionlowtest

BitLockerTogo.EXE Execution

Detects the execution of "BitLockerToGo.EXE". BitLocker To Go is BitLocker Drive Encryption on removable data drives. This feature includes the encryption of, USB flash drives, SD cards, External hard disk drives, Other drives that are formatted by using the NTFS, FAT16, FAT32, or exFAT file system. This is a rarely used application and usage of it at all is worth investigating. Malware such as Lumma stealer has been seen using this process as a target for process hollowing.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Josh Nickels+1Thu Jul 11windows
Detectionmediumtest

Node Process Executions

Detects the execution of other scripts using the Node executable packaged with Adobe Creative Cloud

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1127 · Trusted Developer Utilities Proxy ExecutionT1059.007 · JavaScript
Max Altgelt (Nextron Systems)Wed Apr 06windows
Detectionmediumtest

Suspicious Electron Application Child Processes

Detects suspicious child processes of electron apps (teams, discord, slack, etc.). This could be a potential sign of ".asar" file tampering (See reference section for more information) or binary execution proxy through specific CLI arguments (see related rule)

WindowsProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Oct 21windows