EXPLORE

EXPLORE DETECTIONS

🔍
3,270 detections found

Suspicious Program Location Whitelisted In Firewall Via Netsh.EXE

Detects Netsh command execution that whitelists a program located in a suspicious location in the Windows Firewall

T1562.004
Sigmahigh

Suspicious Program Names

Detects suspicious patterns in program names or folders that are often found in malicious samples or hacktools

T1059
Sigmahigh

Suspicious Provlaunch.EXE Child Process

Detects suspicious child processes of "provlaunch.exe" which might indicate potential abuse to proxy execution.

T1218
Sigmahigh

Suspicious PsExec Execution

detects execution of psexec or paexec with renamed service name, this rule helps to filter out the noise if psexec is used for legit purposes or if attacker uses a different psexec client other than sysinternal one

T1021.002
Sigmahigh

Suspicious PsExec Execution - Zeek

detects execution of psexec or paexec with renamed service name, this rule helps to filter out the noise if psexec is used for legit purposes or if attacker uses a different psexec client other than sysinternal one

T1021.002
Sigmahigh

Suspicious Query of MachineGUID

Use of reg to get MachineGuid information

T1082
Sigmalow

Suspicious RASdial Activity

Detects suspicious process related to rasdial.exe

T1059
Sigmamedium

Suspicious RDP Redirect Using TSCON

Detects a suspicious RDP session redirect using tscon.exe

T1563.002T1021.001
Sigmahigh

Suspicious Reconnaissance Activity Using Get-LocalGroupMember Cmdlet

Detects suspicious reconnaissance command line activity on Windows systems using the PowerShell Get-LocalGroupMember Cmdlet

T1087.001
Sigmamedium

Suspicious Reconnaissance Activity Via GatherNetworkInfo.VBS

Detects execution of the built-in script located in "C:\Windows\System32\gatherNetworkInfo.vbs". Which can be used to gather information about the target machine

T1615T1059.005
Sigmahigh

Suspicious Recursive Takeown

Adversaries can interact with the DACLs using built-in Windows commands takeown which can grant adversaries higher permissions on specific files and folders

T1222.001
Sigmamedium

Suspicious Redirection to Local Admin Share

Detects a suspicious output redirection to the local admins share, this technique is often found in malicious scripts or hacktool stagers

T1048
Sigmahigh

Suspicious Reg Add BitLocker

Detects suspicious addition to BitLocker related registry keys via the reg.exe utility

T1486
Sigmahigh

Suspicious Registry Modification From ADS Via Regini.EXE

Detects the import of an alternate data stream with regini.exe, regini.exe can be used to modify registry keys.

T1112
Sigmahigh

Suspicious Regsvr32 Execution From Remote Share

Detects REGSVR32.exe to execute DLL hosted on remote shares

T1218.010
Sigmahigh

Suspicious Rejected SMB Guest Logon From IP

Detect Attempt PrintNightmare (CVE-2021-1675) Remote code execution in Windows Spooler Service

T1110.001
Sigmamedium

Suspicious Remote Child Process From Outlook

Detects a suspicious child process spawning from Outlook where the image is located in a remote location (SMB/WebDav shares).

T1059T1202
Sigmahigh

Suspicious Remote Logon with Explicit Credentials

Detects suspicious processes logging on with explicit credentials

T1078
Sigmamedium

Suspicious Renamed Comsvcs DLL Loaded By Rundll32

Detects rundll32 loading a renamed comsvcs.dll to dump process memory

T1003.001
Sigmahigh

Suspicious Response File Execution Via Odbcconf.EXE

Detects execution of "odbcconf" with the "-f" flag in order to load a response file with a non-".rsp" extension.

T1218.008
Sigmahigh

Suspicious Reverse Shell Command Line

Detects suspicious shell commands or program code that may be executed or used in command line to establish a reverse shell

T1059.004
Sigmahigh

Suspicious Run Key from Download

Detects the suspicious RUN keys created by software located in Download or temporary Outlook/Internet Explorer directories

T1547.001
Sigmahigh

Suspicious RunAs-Like Flag Combination

Detects suspicious command line flags that let the user set a target user and command as e.g. seen in PsExec-like tools

Sigmamedium

Suspicious Rundll32 Activity Invoking Sys File

Detects suspicious process related to rundll32 based on command line that includes a *.sys file as seen being used by UNC2452

T1218.011
Sigmahigh
PreviousPage 115 of 137Next