EXPLORE

EXPLORE DETECTIONS

🔍
3,270 detections found

Suspicious Windows Defender Registry Key Tampering Via Reg.EXE

Detects the usage of "reg.exe" to tamper with different Windows Defender registry keys in order to disable some important features related to protection and detection

T1562.001
Sigmahigh

Suspicious Windows Service Tampering

Detects the usage of binaries such as 'net', 'sc' or 'powershell' in order to stop, pause, disable or delete critical or important Windows services such as AV, Backup, etc. As seen being used in some ransomware scripts

T1489T1562.001
Sigmahigh

Suspicious Windows Strings In URI

Detects suspicious Windows strings in URI which could indicate possible exfiltration or webshell communication

T1505.003
Sigmahigh

Suspicious Windows Trace ETW Session Tamper Via Logman.EXE

Detects the execution of "logman" utility in order to disable or delete Windows trace sessions

T1562.001T1070.001
Sigmahigh

Suspicious Windows Update Agent Empty Cmdline

Detects suspicious Windows Update Agent activity in which a wuauclt.exe process command line doesn't contain any command line flags

T1036
Sigmahigh

Suspicious WindowsTerminal Child Processes

Detects suspicious children spawned via the Windows Terminal application which could be a sign of persistence via WindowsTerminal (see references section)

Sigmamedium

Suspicious WMIC Execution Via Office Process

Office application called wmic to proxye execution through a LOLBIN process. This is often used to break suspicious parent-child chain (Office app spawns LOLBin).

T1204.002T1047T1218.010
Sigmahigh

Suspicious WmiPrvSE Child Process

Detects suspicious and uncommon child processes of WmiPrvSE

T1047T1204.002T1218.010
Sigmahigh

Suspicious Wordpad Outbound Connections

Detects a network connection initiated by "wordpad.exe" over uncommon destination ports. This might indicate potential process injection activity from a beacon or similar mechanisms.

Sigmamedium

Suspicious Workstation Locking via Rundll32

Detects a suspicious call to the user32.dll function that locks the user workstation

Sigmamedium

Suspicious WSMAN Provider Image Loads

Detects signs of potential use of the WSMAN provider from uncommon processes locally and remote execution.

T1059.001T1021.003
Sigmamedium

Suspicious X509Enrollment - Process Creation

Detect use of X509Enrollment

T1553.004
Sigmamedium

Suspicious X509Enrollment - Ps Script

Detect use of X509Enrollment

T1553.004
Sigmamedium

Suspicious XOR Encoded PowerShell Command

Detects presence of a potentially xor encoded powershell command

T1059.001T1140T1027
Sigmamedium

Suspicious ZipExec Execution

ZipExec is a Proof-of-Concept (POC) tool to wrap binary-based tools into a password-protected zip file.

T1218T1202
Sigmamedium

Symlink Etc Passwd

Detects suspicious command lines that look as if they would create symbolic links to /etc/passwd

T1204.001
Sigmahigh

SyncAppvPublishingServer Bypass Powershell Restriction - PS Module

Detects SyncAppvPublishingServer process execution which usually utilized by adversaries to bypass PowerShell execution restrictions.

T1218
Sigmamedium

SyncAppvPublishingServer Execute Arbitrary PowerShell Code

Executes arbitrary PowerShell code using SyncAppvPublishingServer.exe.

T1218
Sigmamedium

SyncAppvPublishingServer Execution to Bypass Powershell Restriction

Detects SyncAppvPublishingServer process execution which usually utilized by adversaries to bypass PowerShell execution restrictions.

T1218
Sigmamedium

SyncAppvPublishingServer VBS Execute Arbitrary PowerShell Code

Executes arbitrary PowerShell code using SyncAppvPublishingServer.vbs

T1218T1216
Sigmamedium

Sysinternals PsService Execution

Detects usage of Sysinternals PsService which can be abused for service reconnaissance and tampering

T1543.003
Sigmamedium

Sysinternals PsSuspend Execution

Detects usage of Sysinternals PsSuspend which can be abused to suspend critical processes

T1543.003
Sigmamedium

Sysinternals PsSuspend Suspicious Execution

Detects suspicious execution of Sysinternals PsSuspend, where the utility is used to suspend critical processes such as AV or EDR to bypass defenses

T1562.001
Sigmahigh

Sysinternals Tools AppX Versions Execution

Detects execution of Sysinternals tools via an AppX package. Attackers could install the Sysinternals Suite to get access to tools such as psexec and procdump to avoid detection based on System paths.

Sigmalow
PreviousPage 119 of 137Next