EXPLORE

EXPLORE DETECTIONS

🔍
3,270 detections found

SysKey Registry Keys Access

Detects handle requests and access operations to specific registry keys to calculate the SysKey

T1012
Sigmahigh

Syslog Clearing or Removal Via System Utilities

Detects specific commands commonly used to remove or empty the syslog. Which is a technique often used by attacker as a method to hide their tracks

T1070.002
Sigmahigh

Sysmon Application Crashed

Detects application popup reporting a failure of the Sysmon service

T1562
Sigmahigh

Sysmon Blocked Executable

Triggers on any Sysmon "FileBlockExecutable" event, which indicates a violation of the configured block policy

Sigmahigh

Sysmon Blocked File Shredding

Triggers on any Sysmon "FileBlockShredding" event, which indicates a violation of the configured shredding policy.

Sigmahigh

Sysmon Channel Reference Deletion

Potential threat actor tampering with Sysmon manifest and eventually disabling it

T1112
Sigmahigh

Sysmon Configuration Change

Detects a Sysmon configuration change, which could be the result of a legitimate reconfiguration or someone trying manipulate the configuration

Sigmamedium

Sysmon Configuration Error

Detects when an adversary is trying to hide it's action from Sysmon logging based on error messages

T1564
Sigmahigh

Sysmon Configuration Modification

Detects when an attacker tries to hide from Sysmon by disabling or stopping it

T1564
Sigmahigh

Sysmon Configuration Update

Detects updates to Sysmon's configuration. Attackers might update or replace the Sysmon configuration with a bare bone one to avoid monitoring without shutting down the service completely

T1562.001
Sigmamedium

Sysmon Discovery Via Default Driver Altitude Using Findstr.EXE

Detects usage of "findstr" with the argument "385201". Which could indicate potential discovery of an installed Sysinternals Sysmon service using the default driver altitude (even if the name is changed).

T1518.001
Sigmahigh

Sysmon Driver Altitude Change

Detects changes in Sysmon driver altitude value. If the Sysmon driver is configured to load at an altitude of another registered service, it will fail to load at boot.

T1562.001
Sigmahigh

Sysmon Driver Unloaded Via Fltmc.EXE

Detects possible Sysmon filter driver unloaded via fltmc.exe

T1070T1562T1562.002
Sigmahigh

Sysmon File Executable Creation Detected

Triggers on any Sysmon "FileExecutableDetected" event, which triggers every time a PE that is monitored by the config is created.

Sigmamedium

Sysprep on AppData Folder

Detects suspicious sysprep process start with AppData folder as target (as used by Trojan Syndicasec in Thrip report by Symantec)

T1059
Sigmamedium

System and Hardware Information Discovery

Detects system information discovery commands

T1082
Sigmainformational

System Control Panel Item Loaded From Uncommon Location

Detects image load events of system control panel items (.cpl) from uncommon or non-system locations that may indicate DLL sideloading or other abuse techniques.

T1574.001
Sigmahigh

System Disk And Volume Reconnaissance Via Wmic.EXE

An adversary might use WMI to discover information about the system, such as the volume name, size, free space, and other disk information. This can be done using the 'wmic' command-line utility and has been observed being used by threat actors such as Volt Typhoon.

T1047T1082
Sigmamedium

System Drawing DLL Load

Detects processes loading "System.Drawing.ni.dll". This could be an indicator of potential Screen Capture.

T1113
Sigmalow

System File Execution Location Anomaly

Detects the execution of a Windows system binary that is usually located in the system folder from an uncommon location.

T1036
Sigmahigh

System Info Discovery via Sysinfo Syscall

Detects use of the sysinfo system call in Linux, which provides a snapshot of key system statistics such as uptime, load averages, memory usage, and the number of running processes. Malware or reconnaissance tools might leverage sysinfo to fingerprint the system - gathering data to determine if it's a viable target.

T1057T1082
Sigmalow

System Information Discovery

Detects system information discovery commands

T1082
Sigmainformational

System Information Discovery - Auditd

Detects System Information Discovery commands

T1082
Sigmalow

System Information Discovery Using Ioreg

Detects the use of "ioreg" which will show I/O Kit registry information. This process is used for system information discovery. It has been observed in-the-wild by calling this process directly or using bash and grep to look for specific strings.

T1082
Sigmamedium
PreviousPage 120 of 137Next