Detection rules › Sigma

HackTool - Inveigh Execution Artefacts

Severity
critical
Author
Nasreddine Bencherchali (Nextron Systems)
Source
upstream

Detects the presence and execution of Inveigh via dropped artefacts

MITRE ATT&CK coverage

TacticTechniques
Command & ControlT1219.002 Remote Access Tools: Remote Desktop Software

Event coverage

ProviderEvent IDTitle
Sysmon11FileCreate

Stages and Predicates

Stage 1: selection

or:
TargetFilename|endswith: '\Inveigh-Cleartext.txt'
TargetFilename|endswith: '\Inveigh-FormInput.txt'
TargetFilename|endswith: '\Inveigh-Log.txt'
TargetFilename|endswith: '\Inveigh-NTLMv1.txt'
TargetFilename|endswith: '\Inveigh-NTLMv1Users.txt'
TargetFilename|endswith: '\Inveigh-NTLMv2.txt'
TargetFilename|endswith: '\Inveigh-NTLMv2Users.txt'
TargetFilename|endswith: '\Inveigh-Relay.ps1'
TargetFilename|endswith: '\Inveigh.dll'
TargetFilename|endswith: '\Inveigh.exe'
TargetFilename|endswith: '\Inveigh.ps1'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
TargetFilenameends_with
  • \Inveigh-Cleartext.txt
  • \Inveigh-FormInput.txt
  • \Inveigh-Log.txt
  • \Inveigh-NTLMv1.txt
  • \Inveigh-NTLMv1Users.txt
  • \Inveigh-NTLMv2.txt
  • \Inveigh-NTLMv2Users.txt
  • \Inveigh-Relay.ps1
  • \Inveigh.dll
  • \Inveigh.exe
  • \Inveigh.ps1