EXPLORE

EXPLORE DETECTIONS

🔍
3,270 detections found

Windows Firewall Profile Disabled

Detects when a user disables the Windows Firewall via a Profile to help evade defense.

T1686.003
Sigmamedium

Windows Firewall Settings Have Been Changed

Detects activity when the settings of the Windows firewall have been changed

T1686.003
Sigmalow

Windows Hotfix Updates Reconnaissance Via Wmic.EXE

Detects the execution of wmic with the "qfe" flag in order to obtain information about installed hotfix updates on the system. This is often used by pentester and attacker enumeration scripts

T1047
Sigmamedium

Windows Hypervisor Enforced Code Integrity Disabled

Detects changes to the HypervisorEnforcedCodeIntegrity registry key and the "Enabled" value being set to 0 in order to disable the Hypervisor Enforced Code Integrity feature. This allows an attacker to load unsigned and untrusted code to be run in the kernel

T1685
Sigmahigh

Windows Internet Hosted WebDav Share Mount Via Net.EXE

Detects when an internet hosted webdav share is mounted using the "net.exe" utility

T1021.002
Sigmahigh

Windows Kernel Debugger Execution

Detects execution of the Windows Kernel Debugger "kd.exe".

Sigmamedium

Windows LAPS Credential Dump From Entra ID

Detects when an account dumps the LAPS password from Entra ID.

T1098.005
Sigmahigh

Windows Mail App Mailbox Access Via PowerShell Script

Detects PowerShell scripts that try to access the default Windows MailApp MailBox. This indicates manipulation of or access to the stored emails of a user. E.g. this could be used by an attacker to exfiltrate or delete the content of the emails.

T1070.008
Sigmamedium

Windows MSIX Package Support Framework AI_STUBS Execution

Detects execution of Advanced Installer MSIX Package Support Framework (PSF) components, specifically AI_STUBS executables with original filename 'popupwrapper.exe'. This activity may indicate malicious MSIX packages build with Advanced Installer leveraging the Package Support Framework to bypass application control restrictions.

T1218T1553.005T1204.002
Sigmalow

Windows Network Access Suspicious desktop.ini Action

Detects unusual processes accessing desktop.ini remotely over network share, which can be leveraged to alter how Explorer displays a folder's content (i.e. renaming files) without changing them on disk.

T1547.009
Sigmamedium

Windows Pcap Drivers

Detects Windows Pcap driver installation based on a list of associated .sys files.

T1040
Sigmamedium

Windows PowerShell User Agent

Detects Windows PowerShell Web Access

T1071.001
Sigmamedium

Windows Processes Suspicious Parent Directory

Detect suspicious parent processes of well-known Windows processes

T1036.003T1036.005
Sigmalow

Windows Recall Feature Enabled - DisableAIDataAnalysis Value Deleted

Detects the enabling of the Windows Recall feature via registry manipulation. Windows Recall can be enabled by deleting the existing "DisableAIDataAnalysis" registry value. Adversaries may enable Windows Recall as part of post-exploitation discovery and collection activities. This rule assumes that Recall is already explicitly disabled on the host, and subsequently enabled by the adversary.

T1113
Sigmamedium

Windows Recall Feature Enabled - Registry

Detects the enabling of the Windows Recall feature via registry manipulation. Windows Recall can be enabled by setting the value of "DisableAIDataAnalysis" to "0". Adversaries may enable Windows Recall as part of post-exploitation discovery and collection activities. This rule assumes that Recall is already explicitly disabled on the host, and subsequently enabled by the adversary.

T1113
Sigmamedium

Windows Recall Feature Enabled Via Reg.EXE

Detects the enabling of the Windows Recall feature via registry manipulation. Windows Recall can be enabled by deleting the existing "DisableAIDataAnalysis" value, or setting it to 0. Adversaries may enable Windows Recall as part of post-exploitation discovery and collection activities. This rule assumes that Recall is already explicitly disabled on the host, and subsequently enabled by the adversary.

T1113
Sigmamedium

Windows Recovery Environment Disabled Via Reagentc

Detects attempts to disable windows recovery environment using Reagentc. ReAgentc.exe is a command-line tool in Windows used to manage the Windows Recovery Environment (WinRE). It allows users to enable, disable, and configure WinRE, which is used for troubleshooting and repairing common boot issues.

T1490
Sigmamedium

Windows Registry Trust Record Modification

Alerts on trust record modification within the registry, indicating usage of macros

T1566.001
Sigmamedium

Windows Screen Capture with CopyFromScreen

Adversaries may attempt to take screen captures of the desktop to gather information over the course of an operation. Screen capturing functionality may be included as a feature of a remote access tool used in post-compromise operations

T1113
Sigmamedium

Windows Service Terminated With Error

Detects Windows services that got terminated for whatever reason

Sigmalow

Windows Share Mount Via Net.EXE

Detects when a share is mounted using the "net.exe" utility

T1021.002
Sigmalow

Windows Shell/Scripting Application File Write to Suspicious Folder

Detects Windows shells and scripting applications that write files to suspicious folders

T1059
Sigmahigh

Windows Shell/Scripting Processes Spawning Suspicious Programs

Detects suspicious child processes of a Windows shell and scripting processes such as wscript, rundll32, powershell, mshta...etc.

T1059.005T1059.001T1218
Sigmahigh

Windows Terminal Profile Settings Modification By Uncommon Process

Detects the creation or modification of the Windows Terminal Profile settings file "settings.json" by an uncommon process.

T1547.015
Sigmamedium
PreviousPage 134 of 137Next