← Back to SOC feed Coverage →

HackTool - Inveigh Execution Artefacts

sigma CRITICAL SigmaHQ
T1219.002
imFileEvent
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T03:05:59Z · Confidence: medium

Hunt Hypothesis

The hypothesis is that the detection of Inveigh execution artefacts indicates an adversary is leveraging this tool to perform network discovery and lateral movement within the environment. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate potential compromise from advanced persistent threats that use Inveigh as part of their reconnaissance and persistence strategies.

Detection Rule

Sigma (Original)

title: HackTool - Inveigh Execution Artefacts
id: bb09dd3e-2b78-4819-8e35-a7c1b874e449
status: test
description: Detects the presence and execution of Inveigh via dropped artefacts
references:
    - https://github.com/Kevin-Robertson/Inveigh/blob/29d9e3c3a625b3033cdaf4683efaafadcecb9007/Inveigh/Support/Output.cs
    - https://github.com/Kevin-Robertson/Inveigh/blob/29d9e3c3a625b3033cdaf4683efaafadcecb9007/Inveigh/Support/Control.cs
    - https://thedfirreport.com/2020/11/23/pysa-mespinoza-ransomware/
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-10-24
modified: 2024-06-27
tags:
    - attack.command-and-control
    - attack.t1219.002
logsource:
    product: windows
    category: file_event
detection:
    selection:
        TargetFilename|endswith:
            - '\Inveigh-Log.txt'
            - '\Inveigh-Cleartext.txt'
            - '\Inveigh-NTLMv1Users.txt'
            - '\Inveigh-NTLMv2Users.txt'
            - '\Inveigh-NTLMv1.txt'
            - '\Inveigh-NTLMv2.txt'
            - '\Inveigh-FormInput.txt'
            - '\Inveigh.dll'
            - '\Inveigh.exe'
            - '\Inveigh.ps1'
            - '\Inveigh-Relay.ps1'
    condition: selection
falsepositives:
    - Unlikely
level: critical

KQL (Azure Sentinel)

imFileEvent
| where TargetFileName endswith "\\Inveigh-Log.txt" or TargetFileName endswith "\\Inveigh-Cleartext.txt" or TargetFileName endswith "\\Inveigh-NTLMv1Users.txt" or TargetFileName endswith "\\Inveigh-NTLMv2Users.txt" or TargetFileName endswith "\\Inveigh-NTLMv1.txt" or TargetFileName endswith "\\Inveigh-NTLMv2.txt" or TargetFileName endswith "\\Inveigh-FormInput.txt" or TargetFileName endswith "\\Inveigh.dll" or TargetFileName endswith "\\Inveigh.exe" or TargetFileName endswith "\\Inveigh.ps1" or TargetFileName endswith "\\Inveigh-Relay.ps1"

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file/file_event/file_event_win_hktl_inveigh_artefacts.yml