EXPLORE

EXPLORE DETECTIONS

🔍
3,252 detections found

Creation of a Diagcab

Detects the creation of diagcab file, which could be caused by some legitimate installer or is a sign of exploitation (review the filename and its location)

Sigmamedium

Creation of a Local Hidden User Account by Registry

Sysmon registry detection of a local hidden user account.

T1136.001
Sigmahigh

Creation Of A Local User Account

Detects the creation of a new user account. Such accounts may be used for persistence that do not require persistent remote access tools to be deployed on the system.

T1136.001
Sigmalow

Creation Of a Suspicious ADS File Outside a Browser Download

Detects the creation of a suspicious ADS (Alternate Data Stream) file by software other than browsers

Sigmamedium

Creation of an Executable by an Executable

Detects the creation of an executable by another executable.

T1587.001
Sigmalow

Creation Of An User Account

Detects the creation of a new user account. Such accounts may be used for persistence that do not require persistent remote access tools to be deployed on the system.

T1136.001
Sigmamedium

Creation Of Non-Existent System DLL

Detects creation of specific system DLL files that are usually not present on the system (or at least not in system directories) but may be loaded by legitimate processes. Phantom DLL hijacking involves placing malicious DLLs with names of non-existent system binaries in locations where legitimate applications may search for them, leading to execution of the malicious DLLs. Thus, the creation of such DLLs may indicate preparation for phantom DLL hijacking attacks.

T1574.001
Sigmamedium

Creation Of Pod In System Namespace

Detects deployments of pods within the kube-system namespace, which could be intended to imitate system pods. System pods, created by controllers such as Deployments or DaemonSets have random suffixes in their names. Attackers can use this fact and name their backdoor pods as if they were created by these controllers to avoid detection. Deployment of such a backdoor container e.g. named kube-proxy-bv61v, could be attempted in the kube-system namespace alongside the other administrative containers.

T1036.005
Sigmamedium

Creation of WerFault.exe/Wer.dll in Unusual Folder

Detects the creation of a file named "WerFault.exe" or "wer.dll" in an uncommon folder, which could be a sign of WerFault DLL hijacking.

T1574.001
Sigmamedium

Cred Dump Tools Dropped Files

Files with well-known filenames (parts of credential dump software or files produced by them) creation

T1003.001T1003.002T1003.003T1003.004T1003.005
Sigmahigh

Credential Dumping Activity By Python Based Tool

Detects LSASS process access for potential credential dumping by a Python-like tool such as LaZagne or Pypykatz.

T1003.001S0349
Sigmahigh

Credential Dumping Attempt Via Svchost

Detects when a process tries to access the memory of svchost to potentially dump credentials.

T1548
Sigmahigh

Credential Dumping Attempt Via WerFault

Detects process LSASS memory dump using Mimikatz, NanoDump, Invoke-Mimikatz, Procdump or Taskmgr based on the CallTrace pointing to ntdll.dll, dbghelp.dll or dbgcore.dll for win10, server2016 and up.

T1003.001S0002
Sigmahigh

Credential Dumping Tools Service Execution - Security

Detects well-known credential dumping tools execution via service execution events

T1003.001T1003.002T1003.004T1003.005T1003.006+2
Sigmahigh

Credential Dumping Tools Service Execution - System

Detects well-known credential dumping tools execution via service execution events

T1003.001T1003.002T1003.004T1003.005T1003.006+2
Sigmahigh

Credential Manager Access By Uncommon Applications

Detects suspicious processes based on name and location that access the windows credential manager and vault. Which can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::cred" function

T1003
Sigmamedium

Credentials from Password Stores - Keychain

Detects passwords dumps from Keychain

T1555.001
Sigmamedium

Credentials In Files

Detecting attempts to extract passwords with grep and laZagne

T1552.001
Sigmahigh

Credentials In Files - Linux

Detecting attempts to extract passwords with grep

T1552.001
Sigmahigh

CredUI.DLL Loaded By Uncommon Process

Detects loading of "credui.dll" and related DLLs by an uncommon process. Attackers might leverage this DLL for potential use of "CredUIPromptForCredentials" or "CredUnPackAuthenticationBufferW".

T1056.002
Sigmamedium

Critical Hive In Suspicious Location Access Bits Cleared

Detects events from the Kernel-General ETW indicating that the access bits of a hive with a system like hive name located in the temp directory have been reset. This occurs when an application tries to access a hive and the hive has not be recognized since the last 7 days (by default). Registry hive dumping utilities such as QuarksPwDump were seen emitting this behavior.

T1003.002
Sigmahigh

Crontab Enumeration

Detects usage of crontab to list the tasks of the user

T1007
Sigmalow

Cross Site Scripting Strings

Detects XSS attempts injected via GET requests in access logs

T1189
Sigmahigh

Crypto Miner User Agent

Detects suspicious user agent strings used by crypto miners in proxy logs

T1071.001
Sigmahigh
PreviousPage 19 of 136Next