EXPLORE

EXPLORE DETECTIONS

🔍
3,256 detections found

Service Security Descriptor Tampering Via Sc.EXE

Detection of sc.exe utility adding a new service with special permission which hides that service.

T1574.011
Sigmamedium

Service Started/Stopped Via Wmic.EXE

Detects usage of wmic to start or stop a service

T1047
Sigmamedium

Service StartupType Change Via PowerShell Set-Service

Detects the use of the PowerShell "Set-Service" cmdlet to change the startup type of a service to "disabled" or "manual"

T1562.001
Sigmamedium

Service StartupType Change Via Sc.EXE

Detect the use of "sc.exe" to change the startup type of a service to "disabled" or "demand"

T1562.001
Sigmamedium

ServiceDll Hijack

Detects changes to the "ServiceDLL" value related to a service in the registry. This is often used as a method of persistence.

T1543.003
Sigmamedium

SES Identity Has Been Deleted

Detects an instance of an SES identity being deleted via the "DeleteIdentity" event. This may be an indicator of an adversary removing the account that carried out suspicious or malicious activities

T1070
Sigmamedium

Session Manager Autorun Keys Modification

Detects modification of autostart extensibility point (ASEP) in registry.

T1547.001T1546.009
Sigmamedium

Set Files as System Files Using Attrib.EXE

Detects the execution of "attrib" with the "+s" flag to mark files as system files

T1564.001
Sigmalow

Set Suspicious Files as System Files Using Attrib.EXE

Detects the usage of attrib with the "+s" option to set scripts or executables located in suspicious locations as system files to hide them from users and make them unable to be deleted with simple rights. The rule limits the search to specific extensions and directories to avoid FPs

T1564.001
Sigmahigh

Setuid and Setgid

Detects suspicious change of file privileges with chown and chmod commands

T1548.001
Sigmalow

Setup16.EXE Execution With Custom .Lst File

Detects the execution of "Setup16.EXE" and old installation utility with a custom ".lst" file. These ".lst" file can contain references to external program that "Setup16.EXE" will execute. Attackers and adversaries might leverage this as a living of the land utility.

T1574.005
Sigmamedium

Shadow Copies Creation Using Operating Systems Utilities

Shadow Copies creation using operating systems utilities, possible credential access

T1003T1003.002T1003.003
Sigmamedium

Shadow Copies Deletion Using Operating Systems Utilities

Shadow Copies deletion using operating systems utilities

T1070T1490
Sigmahigh

Share And Session Enumeration Using Net.EXE

Detects attempts to enumerate file shares, printer shares and sessions using "net.exe" with the "view" flag.

T1018
Sigmalow

SharpHound Recon Account Discovery

Detects remote RPC calls useb by SharpHound to map remote connections and local group membership.

T1087
Sigmahigh

SharpHound Recon Sessions

Detects remote RPC calls useb by SharpHound to map remote connections and local group membership.

T1033
Sigmahigh

Shell Context Menu Command Tampering

Detects changes to shell context menu commands. Use this rule to hunt for potential anomalies and suspicious shell commands.

Sigmalow

Shell Execution GCC - Linux

Detects the use of the "gcc" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

T1083
Sigmahigh

Shell Execution Of Process Located In Tmp Directory

Detects execution of shells from a parent process located in a temporary (/tmp) directory

Sigmahigh

Shell Execution via Find - Linux

Detects the use of the find command to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or exploitation attempt.

T1083
Sigmahigh

Shell Execution via Flock - Linux

Detects the use of the "flock" command to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

T1083
Sigmahigh

Shell Execution via Git - Linux

Detects the use of the "git" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

T1059
Sigmahigh

Shell Execution via Nice - Linux

Detects the use of the "nice" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

T1083
Sigmahigh

Shell Execution via Rsync - Linux

Detects the use of the "rsync" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

T1059
Sigmahigh
PreviousPage 101 of 136Next