EXPLORE

EXPLORE DETECTIONS

🔍
3,115 detections found

Bitsadmin to Uncommon IP Server Address

Detects Bitsadmin connections to IP addresses instead of FQDN names

T1071.001T1197S0190
Sigmahigh

Bitsadmin to Uncommon TLD

Detects Bitsadmin connections to domains with uncommon TLDs

T1071.001T1197S0190
Sigmahigh

BloodHound Collection Files

Detects default file names outputted by the BloodHound collection tool SharpHound

T1087.001T1087.002T1482T1069.001T1069.002+1
Sigmahigh

Boot Configuration Tampering Via Bcdedit.EXE

Detects the use of the bcdedit command to tamper with the boot configuration data. This technique is often times used by malware or attackers as a destructive way before launching ransomware.

T1490
Sigmahigh

BPFDoor Abnormal Process ID or Lock File Accessed

detects BPFDoor .lock and .pid files access in temporary file storage facility

T1106T1059
Sigmahigh

Bpfdoor TCP Ports Redirect

All TCP traffic on particular port from attacker is routed to different port. ex. '/sbin/iptables -t nat -D PREROUTING -p tcp -s 192.168.1.1 --dport 22 -j REDIRECT --to-ports 42392' The traffic looks like encrypted SSH communications going to TCP port 22, but in reality is being directed to the shell port once it hits the iptables rule for the attacker host only.

T1562.004
Sigmamedium

BPFtrace Unsafe Option Usage

Detects the usage of the unsafe bpftrace option

T1059.004
Sigmamedium

Browser Execution In Headless Mode

Detects execution of Chromium based browser in headless mode

T1105T1564.003
Sigmalow

Browser Started with Remote Debugging

Detects browsers starting with the remote debugging flags. Which is a technique often used to perform browser injection attacks

T1185
Sigmamedium

Buffer Overflow Attempts

Detects buffer overflow attempts in Unix system log files

T1068
Sigmahigh

Bulk Deletion Changes To Privileged Account Permissions

Detects when a user is removed from a privileged role. Bulk changes should be investigated.

T1098
Sigmahigh

Bypass UAC Using DelegateExecute

Bypasses User Account Control using a fileless method

T1548.002
Sigmahigh

Bypass UAC Using Event Viewer

Bypasses User Account Control using Event Viewer and a relevant Windows Registry modification

T1547.010
Sigmahigh

Bypass UAC Using SilentCleanup Task

Detects the setting of the environement variable "windir" to a non default value. Attackers often abuse this variable in order to trigger a UAC bypass via the "SilentCleanup" task. The SilentCleanup task located in %windir%\system32\cleanmgr.exe is an auto-elevated task that can be abused to elevate any file with administrator privileges without prompting UAC.

T1548.002
Sigmahigh

Bypass UAC via CMSTP

Detect commandline usage of Microsoft Connection Manager Profile Installer (cmstp.exe) to install specially formatted local .INF files

T1548.002T1218.003
Sigmahigh

Bypass UAC via Fodhelper.exe

Identifies use of Fodhelper.exe to bypass User Account Control. Adversaries use this technique to execute privileged processes.

T1548.002
Sigmahigh

Bypass UAC via WSReset.exe

Detects use of WSReset.exe to bypass User Account Control (UAC). Adversaries use this technique to execute privileged processes.

T1548.002
Sigmahigh

C# IL Code Compilation Via Ilasm.EXE

Detects the use of "Ilasm.EXE" in order to compile C# intermediate (IL) code to EXE or DLL.

T1127
Sigmamedium

CA Policy Removed by Non Approved Actor

Monitor and alert on conditional access changes where non approved actor removed CA Policy.

T1548T1556
Sigmamedium

CA Policy Updated by Non Approved Actor

Monitor and alert on conditional access changes. Is Initiated by (actor) approved to make changes? Review Modified Properties and compare "old" vs "new" value.

T1548T1556
Sigmamedium

Cab File Extraction Via Wusa.EXE From Potentially Suspicious Paths

Detects the execution of the "wusa.exe" (Windows Update Standalone Installer) utility to extract ".cab" files using the "/extract" argument from potentially suspicious paths.

Sigmahigh

Capabilities Discovery - Linux

Detects usage of "getcap" binary. This is often used during recon activity to determine potential binaries that can be abused as GTFOBins or other.

T1083
Sigmalow

Capsh Shell Invocation - Linux

Detects the use of the "capsh" utility to invoke a shell.

T1059
Sigmahigh

Capture Credentials with Rpcping.exe

Detects using Rpcping.exe to send a RPC test connection to the target server (-s) and force the NTLM hash to be sent in the process.

T1003
Sigmamedium
PreviousPage 12 of 130Next