EXPLORE

EXPLORE DETECTIONS

🔍
3,270 detections found

Suspicious Service Path Modification

Detects service path modification via the "sc" binary to a suspicious command or path

T1543.003
Sigmahigh

Suspicious Shell Open Command Registry Modification

Detects modifications to shell open registry keys that point to suspicious locations typically used by malware for persistence. Generally, modifications to the `*\shell\open\command` registry key can indicate an attempt to change the default action for opening files, and various UAC bypass or persistence techniques involve modifying these keys to execute malicious scripts or binaries.

T1548.002T1546.001
Sigmamedium

Suspicious ShellExec_RunDLL Call Via Ordinal

Detects suspicious call to the "ShellExec_RunDLL" exported function of SHELL32.DLL through the ordinal number to launch other commands. Adversary might only use the ordinal number in order to bypass existing detection that alert on usage of ShellExec_RunDLL on CommandLine.

T1218.011
Sigmahigh

Suspicious Shells Spawn by Java Utility Keytool

Detects suspicious shell spawn from Java utility keytool process (e.g. adselfservice plus exploitation)

Sigmahigh

Suspicious Shim Database Patching Activity

Detects installation of new shim databases that try to patch sections of known processes for potential process injection or persistence.

T1546.011
Sigmahigh

Suspicious SignIns From A Non Registered Device

Detects risky authentication from a non AD registered device without MFA being required.

T1078
Sigmahigh

Suspicious Space Characters in RunMRU Registry Path - ClickFix

Detects the occurrence of numerous space characters in RunMRU registry paths, which may indicate execution via phishing lures using clickfix techniques to hide malicious commands in the Windows Run dialog box from naked eyes.

T1204.004T1027.010
Sigmahigh

Suspicious Space Characters in TypedPaths Registry Path - FileFix

Detects the occurrence of numerous space characters in TypedPaths registry paths, which may indicate execution via phishing lures using file-fix techniques to hide malicious commands.

T1204.004T1027.010
Sigmahigh

Suspicious Speech Runtime Binary Child Process

Detects suspicious Speech Runtime Binary Execution by monitoring its child processes. Child processes spawned by SpeechRuntime.exe could indicate an attempt for lateral movement via COM & DCOM hijacking.

T1021.003T1218
Sigmahigh

Suspicious Splwow64 Without Params

Detects suspicious Splwow64.exe process without any command line parameters

T1202
Sigmahigh

Suspicious Spool Service Child Process

Detects suspicious print spool service (spoolsv.exe) child processes.

T1203T1068
Sigmahigh

Suspicious SQL Error Messages

Detects SQL error messages that indicate probing for an injection attack

T1190
Sigmahigh

Suspicious SQL Query

Detects suspicious SQL query keywrods that are often used during recon, exfiltration or destructive activities. Such as dropping tables and selecting wildcard fields

T1190T1505.001
Sigmamedium

Suspicious SSL Connection

Adversaries may employ a known encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol.

T1573
Sigmalow

Suspicious Start-Process PassThru

Powershell use PassThru option to start in background

T1036.003
Sigmamedium

Suspicious Startup Folder Persistence

Detects the creation of potentially malicious script and executable files in Windows startup folders, which is a common persistence technique used by threat actors. These files (.ps1, .vbs, .js, .bat, etc.) are automatically executed when a user logs in, making the Startup folder an attractive target for attackers. This technique is frequently observed in malvertising campaigns and malware distribution where attackers attempt to maintain long-term access to compromised systems.

T1204.002T1547.001
Sigmahigh

Suspicious Svchost Process Access

Detects suspicious access to the "svchost" process such as that used by Invoke-Phantom to kill the thread of the Windows event logging service.

T1562.002
Sigmahigh

Suspicious SysAidServer Child

Detects suspicious child processes of SysAidServer (as seen in MERCURY threat actor intrusions)

T1210
Sigmamedium

Suspicious SYSTEM User Process Creation

Detects a suspicious process creation as SYSTEM user (suspicious program or command line parameter)

T1134T1003T1027
Sigmahigh

Suspicious SYSVOL Domain Group Policy Access

Detects Access to Domain Group Policies stored in SYSVOL

T1552.006
Sigmamedium

Suspicious Tasklist Discovery Command

Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software/applications running on systems within the network

T1057
Sigmainformational

Suspicious TCP Tunnel Via PowerShell Script

Detects powershell scripts that creates sockets/listeners which could be indicative of tunneling activity

T1090
Sigmamedium

Suspicious Teams Application Related ObjectAcess Event

Detects an access to authentication tokens and accounts of Microsoft Teams desktop application.

T1528
Sigmahigh

Suspicious TSCON Start as SYSTEM

Detects a tscon.exe start as LOCAL SYSTEM

T1219.002
Sigmahigh
PreviousPage 117 of 137Next