Rule Library

Sigma Rules

39 rules found for "resource-development"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectioncriticaltest

Bitbucket Unauthorized Access To A Resource

Detects unauthorized access attempts to a resource.

bitbucketaudit
TA0042 · Resource DevelopmentT1586 · Compromise Accounts
Muhammad FaisalSun Feb 25application
Detectioncriticaltest

Bitbucket Unauthorized Full Data Export Triggered

Detects when full data export is attempted an unauthorized user.

bitbucketaudit
TA0009 · CollectionTA0042 · Resource DevelopmentT1213.003 · Code RepositoriesT1586 · Compromise Accounts
Muhammad FaisalSun Feb 25application
Detectionhightest

Antivirus Relevant File Paths Alerts

Detects an Antivirus alert in a highly relevant file path or with a relevant file name. This event must not be ignored just because the AV has blocked the malware but investigate, how it came there in the first place.

Antivirus Alert
TA0042 · Resource DevelopmentT1588 · Obtain Capabilities
Florian Roth (Nextron Systems)+1Sun Sep 09category
Detectionhighexperimental

AWS KMS Imported Key Material Usage

Detects the import or deletion of key material in AWS KMS, which can be used as part of ransomware attacks. This activity is uncommon and provides a high certainty signal.

AWScloudtrail
TA0040 · ImpactT1486 · Data Encrypted for ImpactTA0042 · Resource DevelopmentT1608.003 · Install Digital Certificate
toopriceySat Oct 18cloud
Detectionhightest

Okta Suspicious Activity Reported by End-user

Detects when an Okta end-user reports activity by their account as being potentially suspicious.

Oktaokta
TA0042 · Resource DevelopmentT1586.003 · Cloud Accounts
kelnageThu Sep 07identity
Detectionmediumtest

Program Executions in Suspicious Folders

Detects program executions in suspicious non-program folders related to malware or hacking activity

Linuxauditd
T1587 · Develop CapabilitiesT1584 · Compromise InfrastructureTA0042 · Resource Development
Florian Roth (Nextron Systems)Tue Jan 23linux
Detectionhighstable

Relevant ClamAV Message

Detects relevant ClamAV messages

Linuxclamav
TA0042 · Resource DevelopmentT1588.001 · Malware
Florian Roth (Nextron Systems)Wed Mar 01linux
Detectionhightest

Linux HackTool Execution

Detects known hacktool execution based on image name.

LinuxProcess Creation
TA0002 · ExecutionTA0042 · Resource DevelopmentT1587 · Develop Capabilities
Nasreddine Bencherchali (Nextron Systems)+1Tue Jan 03linux
Detectionhightest

Suspicious External WebDAV Execution

Detects executables launched from external WebDAV shares using the WebDAV Explorer integration, commonly seen in initial access campaigns.

Proxy Log
TA0001 · Initial AccessTA0042 · Resource DevelopmentT1584 · Compromise InfrastructureT1566 · Phishing
Ahmed FaroukFri May 10web
Detectionhightest

Relevant Anti-Virus Signature Keywords In Application Log

Detects potentially highly relevant antivirus events in the application log based on known virus signature names and malware keywords.

Windowsapplication
TA0042 · Resource DevelopmentT1588 · Obtain Capabilities
Florian Roth (Nextron Systems)+1Sun Feb 19windows
Detectioncriticaltest

ProxyLogon MSExchange OabVirtualDirectory

Detects specific patterns found after a successful ProxyLogon exploitation in relation to a Commandlet invocation of Set-OabVirtualDirectory

Windowsmsexchange-management
T1587.001 · MalwareTA0042 · Resource Development
Florian Roth (Nextron Systems)Mon Aug 09windows
Detectioninformationalstable

Windows Update Error

Detects Windows update errors including installation failures and connection issues. Defenders should observe this in case critical update KBs aren't installed.

Windowssystem
TA0040 · ImpactTA0042 · Resource DevelopmentT1584 · Compromise Infrastructure
François HubautSat Dec 04windows
Detectionhightest

Uncommon File Created In Office Startup Folder

Detects the creation of a file with an uncommon extension in an Office application startup folder

WindowsFile Event
TA0042 · Resource DevelopmentT1587.001 · Malware
François Hubaut+1Sun Jun 05windows
Detectionmediumtest

Creation of a Diagcab

Detects the creation of diagcab file, which could be caused by some legitimate installer or is a sign of exploitation (review the filename and its location)

WindowsFile Event
TA0042 · Resource Development
François HubautWed Jun 08windows
Detectionmediumtest

VHD Image Download Via Browser

Detects creation of ".vhd"/".vhdx" files by browser processes. Malware can use mountable Virtual Hard Disk ".vhd" files to encapsulate payloads and evade security controls.

WindowsFile Event
TA0042 · Resource DevelopmentT1587.001 · Malware
François Hubaut+2Mon Oct 25windows
Detectioncriticaltest

Hacktool Execution - Imphash

Detects the execution of different Windows based hacktools via their import hash (imphash) even if the files have been renamed

WindowsProcess Creation
TA0006 · Credential AccessTA0042 · Resource DevelopmentT1588.002 · ToolT1003 · OS Credential Dumping
Florian Roth (Nextron Systems)Fri Mar 04windows
Detectionhightest

Hacktool Execution - PE Metadata

Detects the execution of different Windows based hacktools via PE metadata (company, product, etc.) even if the files have been renamed

WindowsProcess Creation
TA0006 · Credential AccessTA0042 · Resource DevelopmentT1588.002 · ToolT1003 · OS Credential Dumping
Florian Roth (Nextron Systems)Wed Apr 27windows
Detectioncriticaltest

HackTool - PurpleSharp Execution

Detects the execution of the PurpleSharp adversary simulation tool

WindowsProcess Creation
T1587 · Develop CapabilitiesTA0042 · Resource Development
Florian Roth (Nextron Systems)Fri Jun 18windows
Detectionhightest

PUA - CsExec Execution

Detects the use of the lesser known remote execution tool named CsExec a PsExec alternative

WindowsProcess Creation
TA0042 · Resource DevelopmentT1587.001 · MalwareTA0002 · ExecutionT1569.002 · Service Execution
Florian Roth (Nextron Systems)Mon Aug 22windows
Detectionhightest

Renamed SysInternals DebugView Execution

Detects suspicious renamed SysInternals DebugView execution

WindowsProcess Creation
TA0042 · Resource DevelopmentT1588.002 · Tool
Florian Roth (Nextron Systems)Thu May 28windows
Detectionhightest

Suspicious Download from Office Domain

Detects suspicious ways to download files from Microsoft domains that are used to store attachments in Emails or OneNote documents

WindowsProcess Creation
TA0011 · Command and ControlTA0042 · Resource DevelopmentT1105 · Ingress Tool TransferT1608 · Stage Capabilities
Florian Roth (Nextron Systems)+1Mon Dec 27windows
Detectionlowtest

Potential Execution of Sysinternals Tools

Detects command lines that contain the 'accepteula' flag which could be a sign of execution of one of the Sysinternals tools

WindowsProcess Creation
TA0042 · Resource DevelopmentT1588.002 · Tool
Markus NeisMon Aug 28windows
Detectionhightest

PsExec/PAExec Escalation to LOCAL SYSTEM

Detects suspicious commandline flags used by PsExec and PAExec to escalate a command line to LOCAL_SYSTEM rights

WindowsProcess Creation
TA0042 · Resource DevelopmentT1587.001 · Malware
Florian Roth (Nextron Systems)+1Tue Nov 23windows
Detectionhightest

Potential PsExec Remote Execution

Detects potential psexec command that initiate execution on a remote systems via common commandline flags used by the utility

WindowsProcess Creation
TA0042 · Resource DevelopmentT1587.001 · Malware
Florian Roth (Nextron Systems)+1Tue Feb 28windows
Detectionhightest

Potential Privilege Escalation To LOCAL SYSTEM

Detects unknown program using commandline flags usually used by tools such as PsExec and PAExec to start programs with SYSTEM Privileges

WindowsProcess Creation
TA0042 · Resource DevelopmentT1587.001 · Malware
Florian Roth (Nextron Systems)+1Sat May 22windows
Detectionhightest

HybridConnectionManager Service Installation - Registry

Detects the installation of the Azure Hybrid Connection Manager service to allow remote code execution from Azure function.

WindowsRegistry Event
TA0042 · Resource DevelopmentT1608 · Stage Capabilities
Roberto Rodriguez (Cyb3rWard0g)+1Mon Apr 12windows
Detectionlowtest

PUA - Sysinternal Tool Execution - Registry

Detects the execution of a Sysinternals Tool via the creation of the "accepteula" registry key

WindowsRegistry Set
TA0042 · Resource DevelopmentT1588.002 · Tool
Markus NeisMon Aug 28windows
Detectionhightest

Suspicious Execution Of Renamed Sysinternals Tools - Registry

Detects the creation of the "accepteula" key related to the Sysinternals tools being created from executables with the wrong name (e.g. a renamed Sysinternals tool)

WindowsRegistry Set
TA0042 · Resource DevelopmentT1588.002 · Tool
Nasreddine Bencherchali (Nextron Systems)Wed Aug 24windows
Detectionmediumtest

PUA - Sysinternals Tools Execution - Registry

Detects the execution of some potentially unwanted tools such as PsExec, Procdump, etc. (part of the Sysinternals suite) via the creation of the "accepteula" registry key.

WindowsRegistry Set
TA0042 · Resource DevelopmentT1588.002 · Tool
Nasreddine Bencherchali (Nextron Systems)Wed Aug 24windows
Detectionhightest

Usage of Renamed Sysinternals Tools - RegistrySet

Detects non-sysinternals tools setting the "accepteula" key which normally is set on sysinternals tool execution

WindowsRegistry Set
TA0042 · Resource DevelopmentT1588.002 · Tool
Nasreddine Bencherchali (Nextron Systems)Wed Aug 24windows
Detectionmediumtest

Suspicious Keyboard Layout Load

Detects the keyboard preload installation with a suspicious keyboard layout, e.g. Chinese, Iranian or Vietnamese layout load in user session on systems maintained by US staff only

WindowsRegistry Set
TA0042 · Resource DevelopmentT1588.002 · Tool
Florian Roth (Nextron Systems)Sat Oct 12windows
Emerging Threathightest

Formbook Process Creation

Detects Formbook like process executions that inject code into a set of files in the System32 folder, which executes a special command command line to delete the dropper from the AppData Temp folder. We avoid false positives by excluding all parent process with command line parameters.

WindowsProcess Creation
TA0042 · Resource DevelopmentT1587.001 · Malwaredetection.emerging-threats
Florian Roth (Nextron Systems)+2Mon Sep 302019
Emerging Threathightest

Mustang Panda Dropper

Detects specific process parameters as used by Mustang Panda droppers

WindowsProcess Creation
T1587.001 · MalwareTA0042 · Resource Developmentdetection.emerging-threats
Florian Roth (Nextron Systems)+1Wed Oct 302019
Emerging Threatcriticaltest

CVE-2021-1675 Print Spooler Exploitation Filename Pattern

Detects the default filename used in PoC code against print spooler vulnerability CVE-2021-1675

WindowsFile Event
TA0002 · ExecutionTA0004 · Privilege EscalationTA0042 · Resource DevelopmentT1587 · Develop Capabilities+2
Florian Roth (Nextron Systems)Tue Jun 292021
Emerging Threathightest

Suspicious Word Cab File Write CVE-2021-40444

Detects file creation patterns noticeable during the exploitation of CVE-2021-40444

WindowsFile Event
TA0042 · Resource DevelopmentT1587 · Develop Capabilitiesdetection.emerging-threats
Florian Roth (Nextron Systems)+1Fri Sep 102021
Emerging Threathightest

Conti Volume Shadow Listing

Detects a command used by conti to find volume shadow backups

WindowsProcess Creation
T1587.001 · MalwareTA0042 · Resource Developmentdetection.emerging-threats
Max Altgelt (Nextron Systems)+1Mon Aug 092021
Emerging Threatcriticaltest

FoggyWeb Backdoor DLL Loading

Detects DLL hijacking technique used by NOBELIUM in their FoggyWeb backdoor. Which loads a malicious version of the expected "version.dll" dll

WindowsImage Load (DLL)
TA0042 · Resource DevelopmentT1587 · Develop Capabilitiesdetection.emerging-threats
Florian Roth (Nextron Systems)Mon Sep 272021
Threat Huntlowtest

Creation of an Executable by an Executable

Detects the creation of an executable by another executable.

WindowsFile Event
TA0042 · Resource DevelopmentT1587.001 · Malwaredetection.threat-hunting
François HubautWed Mar 09windows
Threat Huntmediumtest

WebDAV Temporary Local File Creation

Detects the creation of WebDAV temporary files with potentially suspicious extensions

WindowsFile Event
TA0001 · Initial AccessTA0042 · Resource DevelopmentT1584 · Compromise InfrastructureT1566 · Phishing+1
Micah BabinskiMon Aug 21windows