EXPLORE

EXPLORE DETECTIONS

🔍
3,270 detections found

Startup/Logon Script Added to Group Policy Object

Detects the modification of Group Policy Objects (GPO) to add a startup/logon script to users or computer objects.

T1484.001T1547
Sigmamedium

Steganography Extract Files with Steghide

Detects extraction of files with usage of steghide binary, the adversaries may use this technique to prevent the detection of hidden information.

T1027.003
Sigmalow

Steganography Hide Files with Steghide

Detects embedding of files with usage of steghide binary, the adversaries may use this technique to prevent the detection of hidden information.

T1027.003
Sigmalow

Steganography Hide Zip Information in Picture File

Detects appending of zip file to image

T1027.003
Sigmalow

Steganography Unzip Hidden Information From Picture File

Detects extracting of zip file from image file

T1027.003
Sigmalow

Sticky Key Like Backdoor Execution

Detects the usage and installation of a backdoor that uses an option to register a malicious debugger for built-in tools that are accessible in the login screen

T1546.008
Sigmacritical

Sticky Key Like Backdoor Usage - Registry

Detects the usage and installation of a backdoor that uses an option to register a malicious debugger for built-in tools that are accessible in the login screen

T1546.008
Sigmacritical

Stop Windows Service Via Net.EXE

Detects the stopping of a Windows service via the "net" utility.

T1489
Sigmalow

Stop Windows Service Via PowerShell Stop-Service

Detects the stopping of a Windows service via the PowerShell Cmdlet "Stop-Service"

T1489
Sigmalow

Stop Windows Service Via Sc.EXE

Detects the stopping of a Windows service via the "sc.exe" utility

T1489
Sigmalow

Successful Account Login Via WMI

Detects successful logon attempts performed with WMI

T1047
Sigmalow

Successful Authentications From Countries You Do Not Operate Out Of

Detect successful authentications from countries you do not operate out of.

T1078.004T1110
Sigmamedium

Successful IIS Shortname Fuzzing Scan

When IIS uses an old .Net Framework it's possible to enumerate folders with the symbol "~"

T1190
Sigmamedium

Successful MSIX/AppX Package Installation

Detects successful MSIX/AppX package installations on Windows systems by monitoring EventID 854 in the Microsoft-Windows-AppXDeployment-Server/Operational log. While most installations are legitimate, this can help identify unauthorized or suspicious package installations. It is crucial to monitor such events as threat actors may exploit MSIX/AppX packages to deliver and execute malicious payloads.

T1204.002
Sigmalow

Successful Overpass the Hash Attempt

Detects successful logon with logon type 9 (NewCredentials) which matches the Overpass the Hash behavior of e.g Mimikatz's sekurlsa::pth module.

S0002T1550.002
Sigmahigh

Suspect Svchost Activity

It is extremely abnormal for svchost.exe to spawn without any CLI arguments and is normally observed when a malicious process spawns the process and injects code into the process memory space.

T1055
Sigmahigh

Suspicious Access to Sensitive File Extensions

Detects known sensitive file extensions accessed on a network share

T1039
Sigmamedium

Suspicious Access to Sensitive File Extensions - Zeek

Detects known sensitive file extensions via Zeek

Sigmamedium

Suspicious Active Directory Database Snapshot Via ADExplorer

Detects the execution of Sysinternals ADExplorer with the "-snapshot" flag in order to save a local copy of the active directory database to a suspicious directory. This can be used by attackers to extract data for Bloodhound, usernames for password spraying or use the meta data for social engineering. The snapshot doesn't contain password hashes but there have been cases, where administrators put passwords in the comment field.

T1087.002T1069.002T1482
Sigmahigh

Suspicious Activity in Shell Commands

Detects suspicious shell commands used in various exploit codes (see references)

T1059.004
Sigmahigh

Suspicious AddinUtil.EXE CommandLine Execution

Detects execution of the Add-In deployment cache updating utility (AddInutil.exe) with suspicious Addinroot or Pipelineroot paths. An adversary may execute AddinUtil.exe with uncommon Addinroot/Pipelineroot paths that point to the adversaries Addins.Store payload.

T1218
Sigmahigh

Suspicious Advpack Call Via Rundll32.EXE

Detects execution of "rundll32" calling "advpack.dll" with potential obfuscated ordinal calls in order to leverage the "RegisterOCX" function

Sigmahigh

Suspicious AgentExecutor PowerShell Execution

Detects execution of the AgentExecutor.exe binary. Which can be abused as a LOLBIN to execute powershell scripts with the ExecutionPolicy "Bypass" or any binary named "powershell.exe" located in the path provided by 6th positional argument

T1218
Sigmahigh

Suspicious Appended Extension

Detects file renames where the target filename uses an uncommon double extension. Could indicate potential ransomware activity renaming files and adding a custom extension to the encrypted files, such as ".jpg.crypted", ".docx.locky", etc.

T1486
Sigmamedium
PreviousPage 104 of 137Next