Detection rules › Sigma
HackTool - NetExec File Indicators
Detects file creation events indicating NetExec (nxc.exe) execution on the local machine. NetExec is a PyInstaller-bundled binary that extracts its embedded data files to a "_MEI Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or MITRE ATT&CK coverage
Tactic Techniques Execution T1059.005 Command and Scripting Interpreter: Visual BasicLateral Movement T1021.002 Remote Services: SMB/Windows Admin SharesEvent coverage
Provider Event ID Title Sysmon 11 FileCreate Stages and Predicates
Stage 1:
selectionor:
TargetFilename|contains: '\Temp\_MEI'
TargetFilename|contains: '\nxc\data\'
Image|contains: '\nxc-windows-latest\'
Indicators
1 shows that the indicator is specific to this rule.Field Kind Values Imagematch \nxc-windows-latest\TargetFilenamematch \Temp\_MEI\nxc\data\