Detection rules › Sigma

PUA- IOX Tunneling Tool Execution

Severity
high
Author
Florian Roth (Nextron Systems)
Source
upstream

Detects the use of IOX - a tool for port forwarding and intranet proxy purposes

MITRE ATT&CK coverage

TacticTechniques
Command & ControlT1090 Proxy

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: 1 of selection

Image|endswith: '\iox.exe'

Stage 2: 1 of selection_commandline

or:
CommandLine|contains: '.exe fwd -l '
CommandLine|contains: '.exe fwd -r '
CommandLine|contains: '.exe proxy -l '
CommandLine|contains: '.exe proxy -r '

Stage 3: 1 of selection_hashes

or:
Hashes|contains: 'MD5=9DB2D314DD3F704A02051EF5EA210993'
Hashes|contains: 'SHA1=039130337E28A6623ECF9A0A3DA7D92C5964D8DD'
Hashes|contains: 'SHA256=C6CF82919B809967D9D90EA73772A8AA1C1EB3BC59252D977500F64F1A0D6731'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • .exe fwd -l
  • .exe fwd -r
  • .exe proxy -l
  • .exe proxy -r
Hashesmatch
  • MD5=9DB2D314DD3F704A02051EF5EA210993
  • SHA1=039130337E28A6623ECF9A0A3DA7D92C5964D8DD
  • SHA256=C6CF82919B809967D9D90EA73772A8AA1C1EB3BC59252D977500F64F1A0D6731
Imageends_with
  • \iox.exe