EXPLORE

EXPLORE DETECTIONS

🔍
3,252 detections found

CLR DLL Loaded Via Office Applications

Detects CLR DLL being loaded by an Office Product

T1204.002
Sigmamedium

Cmd Launched with Hidden Start Flags to Suspicious Targets

Detects cmd.exe executing commands with the "start" utility using "/b" (no window) or "/min" (minimized) flags. To reduce false positives from standard background tasks, detection is restricted to scenarios where the target is a known script extension or located in suspicious temporary/public directories. This technique was observed in Chaos, DarkSide, and Emotet malware campaigns.

T1564.003
Sigmamedium

CMD Shell Output Redirect

Detects the use of the redirection character ">" to redirect information on the command line. This technique is sometimes used by malicious actors in order to redirect the output of reconnaissance commands such as "hostname" and "dir" to files for future exfiltration.

T1082
Sigmalow

Cmd.EXE Missing Space Characters Execution Anomaly

Detects Windows command lines that miss a space before or after the /c flag when running a command using the cmd.exe. This could be a sign of obfuscation of a fat finger problem (typo by the developer).

T1059.001
Sigmahigh

CMSTP Execution Process Access

Detects various indicators of Microsoft Connection Manager Profile Installer execution

T1218.003T1559.001G0069G0080
Sigmahigh

CMSTP Execution Process Creation

Detects various indicators of Microsoft Connection Manager Profile Installer execution

T1218.003G0069
Sigmahigh

CMSTP Execution Registry Event

Detects various indicators of Microsoft Connection Manager Profile Installer execution

T1218.003G0069
Sigmahigh

CMSTP UAC Bypass via COM Object Access

Detects UAC Bypass Attempt Using Microsoft Connection Manager Profile Installer Autoelevate-capable COM Objects (e.g. UACMe ID of 41, 43, 58 or 65)

T1548.002T1218.003G0069
Sigmahigh

Cobalt Strike DNS Beaconing

Detects suspicious DNS queries known from Cobalt Strike beacons

T1071.004
Sigmacritical

CobaltStrike Load by Rundll32

Rundll32 can be use by Cobalt Strike with StartW function to load DLLs from the command line.

T1218.011
Sigmahigh

CobaltStrike Named Pipe

Detects the creation of a named pipe as used by CobaltStrike

T1055
Sigmacritical

CobaltStrike Named Pipe Pattern Regex

Detects the creation of a named pipe matching a pattern used by CobaltStrike Malleable C2 profiles

T1055
Sigmacritical

CobaltStrike Named Pipe Patterns

Detects the creation of a named pipe with a pattern found in CobaltStrike malleable C2 profiles

T1055
Sigmahigh

CobaltStrike Service Installations - Security

Detects known malicious service installs that appear in cases in which a Cobalt Strike beacon elevates privileges or lateral movement

T1021.002T1543.003T1569.002
Sigmahigh

CobaltStrike Service Installations - System

Detects known malicious service installs that appear in cases in which a Cobalt Strike beacon elevates privileges or lateral movement

T1021.002T1543.003T1569.002
Sigmacritical

Code Executed Via Office Add-in XLL File

Adversaries may abuse Microsoft Office add-ins to obtain persistence on a compromised system. Office add-ins can be used to add functionality to Office programs

T1137.006
Sigmahigh

Code Execution via Pcwutl.dll

Detects launch of executable by calling the LaunchApplication function from pcwutl.dll library.

T1218.011
Sigmamedium

Code Injection by ld.so Preload

Detects the ld.so preload persistence file. See `man ld.so` for more information.

T1574.006
Sigmahigh

CodeIntegrity - Blocked Driver Load With Revoked Certificate

Detects blocked load attempts of revoked drivers

T1543
Sigmahigh

CodeIntegrity - Blocked Image Load With Revoked Certificate

Detects blocked image load events with revoked certificates by code integrity.

Sigmahigh

CodeIntegrity - Blocked Image/Driver Load For Policy Violation

Detects blocked load events that did not meet the authenticode signing level requirements or violated the code integrity policy.

T1543
Sigmahigh

CodeIntegrity - Disallowed File For Protected Processes Has Been Blocked

Detects block events for files that are disallowed by code integrity for protected processes

Sigmahigh

CodeIntegrity - Revoked Image Loaded

Detects image load events with revoked certificates by code integrity.

Sigmahigh

CodeIntegrity - Revoked Kernel Driver Loaded

Detects the load of a revoked kernel driver

Sigmahigh
PreviousPage 16 of 136Next