EXPLORE

EXPLORE DETECTIONS

🔍
3,270 detections found

Use of FSharp Interpreters

Detects the execution of FSharp Interpreters "FsiAnyCpu.exe" and "FSi.exe" Both can be used for AWL bypass and to execute F# code via scripts or inline.

T1059
Sigmamedium

Use Of Hidden Paths Or Files

Detects calls to hidden files or files located in hidden directories in NIX systems.

T1574.001
Sigmalow

Use of Legacy Authentication Protocols

Alert on when legacy authentication has been used on an account

T1078.004T1110
Sigmahigh

Use of OpenConsole

Detects usage of OpenConsole binary as a LOLBIN to launch other binaries to bypass application Whitelisting

T1059
Sigmamedium

Use of Pcalua For Execution

Detects execition of commands and binaries from the context of The program compatibility assistant (Pcalua.exe). This can be used as a LOLBIN in order to bypass application whitelisting.

T1059
Sigmamedium

Use of Remote.exe

Remote.exe is part of WinDbg in the Windows SDK and can be used for AWL bypass and running remote files.

T1127
Sigmamedium

Use Of Remove-Item to Delete File - ScriptBlock

PowerShell Remove-Item with -Path to delete a file or a folder with "-Recurse"

T1070.004
Sigmalow

Use of Scriptrunner.exe

The "ScriptRunner.exe" binary can be abused to proxy execution through it and bypass possible whitelisting

T1218
Sigmamedium

Use Of The SFTP.EXE Binary As A LOLBIN

Detects the usage of the "sftp.exe" binary as a LOLBIN by abusing the "-D" flag

T1218
Sigmamedium

Use of TTDInject.exe

Detects the executiob of TTDInject.exe, which is used by Windows 10 v1809 and newer to debug time travel (underlying call of tttracer.exe)

T1127
Sigmamedium

Use of UltraVNC Remote Access Software

An adversary may use legitimate desktop support and remote access software,to establish an interactive command and control channel to target systems within networks

T1219.002
Sigmamedium

Use of VisualUiaVerifyNative.exe

VisualUiaVerifyNative.exe is a Windows SDK that can be used for AWL bypass and is listed in Microsoft's recommended block rules.

T1218
Sigmamedium

Use of VSIISExeLauncher.exe

The "VSIISExeLauncher.exe" binary part of the Visual Studio/VS Code can be used to execute arbitrary binaries

T1127
Sigmamedium

Use of W32tm as Timer

When configured with suitable command line arguments, w32tm can act as a delay mechanism

T1124
Sigmahigh

Use of Wfc.exe

The Workflow Command-line Compiler can be used for AWL bypass and is listed in Microsoft's recommended block rules.

T1127
Sigmamedium

Use Short Name Path in Command Line

Detects the use of short name paths (8.3 format) in command lines, which can be used to obfuscate paths or access restricted locations. Windows creates short 8.3 filenames (like PROGRA~1) for compatibility with MS-DOS-based or 16-bit Windows programs. When investigating, examine: - Commands using short paths to access sensitive directories or files - Web servers on Windows (especially Apache) where short filenames could bypass security controls - Correlation with other suspicious behaviors - baseline of short name usage in your environment and look for deviations

T1564.004
Sigmamedium

Use Short Name Path in Image

Detect use of the Windows 8.3 short name. Which could be used as a method to avoid Image detection

T1564.004
Sigmamedium

User Access Blocked by Azure Conditional Access

Detect access has been blocked by Conditional Access policies. The access policy does not allow token issuance which might be sights≈ of unauthorizeed login to valid accounts.

T1110T1078.004
Sigmamedium

User Added To Admin Group Via Dscl

Detects attempts to create and add an account to the admin group via "dscl"

T1078.003
Sigmamedium

User Added To Admin Group Via DseditGroup

Detects attempts to create and/or add an account to the admin group, thus granting admin privileges.

T1078.003
Sigmamedium

User Added To Admin Group Via Sysadminctl

Detects attempts to create and add an account to the admin group via "sysadminctl"

T1078.003
Sigmamedium

User Added to an Administrator's Azure AD Role

User Added to an Administrator's Azure AD Role

T1098.003T1078
Sigmamedium

User Added To Group With CA Policy Modification Access

Monitor and alert on group membership additions of groups that have CA policy modification access

T1548T1556
Sigmamedium

User Added To Highly Privileged Group

Detects addition of users to highly privileged groups via "Net" or "Add-LocalGroupMember".

T1098
Sigmahigh
PreviousPage 128 of 137Next