EXPLORE

EXPLORE DETECTIONS

🔍
3,252 detections found

HackTool - CoercedPotato Named Pipe Creation

Detects the pattern of a pipe name as used by the hack tool CoercedPotato

T1055
Sigmahigh

HackTool - Covenant PowerShell Launcher

Detects suspicious command lines used in Covenant luanchers

T1059.001T1564.003
Sigmahigh

HackTool - CrackMapExec Execution

This rule detect common flag combinations used by CrackMapExec in order to detect its use even if the binary has been replaced.

T1047T1053T1059.003T1059.001T1110+1
Sigmahigh

HackTool - CrackMapExec Execution Patterns

Detects various execution patterns of the CrackMapExec pentesting framework

T1047T1053T1059.003T1059.001S0106
Sigmahigh

HackTool - CrackMapExec File Indicators

Detects file creation events with filename patterns used by CrackMapExec.

T1003.001
Sigmahigh

HackTool - CrackMapExec PowerShell Obfuscation

The CrachMapExec pentesting framework implements a PowerShell obfuscation with some static strings detected by this rule.

T1059.001T1027.005
Sigmahigh

HackTool - CrackMapExec Process Patterns

Detects suspicious process patterns found in logs when CrackMapExec is used

T1003.001
Sigmahigh

HackTool - CreateMiniDump Execution

Detects the use of CreateMiniDump hack tool used to dump the LSASS process memory for credential extraction on the attacker's machine

T1003.001
Sigmahigh

HackTool - Credential Dumping Tools Named Pipe Created

Detects well-known credential dumping tools execution via specific named pipe creation

T1003.001T1003.002T1003.004T1003.005
Sigmacritical

HackTool - Default PowerSploit/Empire Scheduled Task Creation

Detects the creation of a schtask via PowerSploit or Empire Default Configuration.

S0111G0022G0060T1053.005T1059.001
Sigmahigh

HackTool - DiagTrackEoP Default Named Pipe

Detects creation of default named pipe used by the DiagTrackEoP POC, a tool that abuses "SeImpersonate" privilege.

Sigmacritical

HackTool - DInjector PowerShell Cradle Execution

Detects the use of the Dinject PowerShell cradle based on the specific flags

T1055
Sigmacritical

HackTool - Doppelanger LSASS Dumper Execution

Detects the execution of the Doppelanger hacktool which is used to dump LSASS memory via process cloning while evading common detection methods

T1003.001
Sigmahigh

HackTool - Dumpert Process Dumper Default File

Detects the creation of the default dump file used by Outflank Dumpert tool. A process dumper, which dumps the lsass process memory

T1003.001
Sigmacritical

HackTool - Dumpert Process Dumper Execution

Detects the use of Dumpert process dumper, which dumps the lsass.exe process memory

T1003.001
Sigmacritical

Hacktool - EDR-Freeze Execution

Detects execution of EDR-Freeze, a tool that exploits the MiniDumpWriteDump function and WerFaultSecure.exe to suspend EDR and Antivirus processes on Windows. EDR-Freeze leverages a race-condition attack to put security processes into a dormant state by suspending WerFaultSecure at the moment it freezes the target process. This technique does not require kernel-level exploits or BYOVD, but instead abuses user-mode functionality to temporarily disable monitoring by EDR or Antimalware solutions.

T1562.001
Sigmahigh

HackTool - EDRSilencer Execution

Detects the execution of EDRSilencer, a tool that leverages Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server based on PE metadata information.

T1562
Sigmahigh

HackTool - EDRSilencer Execution - Filter Added

Detects execution of EDRSilencer, a tool that abuses the Windows Filtering Platform (WFP) to block the outbound traffic of running EDR agents based on specific hardcoded filter names.

T1562
Sigmahigh

HackTool - EfsPotato Named Pipe Creation

Detects the pattern of a pipe name as used by the hack tool EfsPotato

T1055
Sigmahigh

HackTool - Empire PowerShell Launch Parameters

Detects suspicious powershell command line parameters used in Empire

T1059.001
Sigmahigh

HackTool - Empire PowerShell UAC Bypass

Detects some Empire PowerShell UAC bypass methods

T1548.002
Sigmacritical

HackTool - Empire UserAgent URI Combo

Detects user agent and URI paths used by empire agents

T1071.001
Sigmahigh

HackTool - Evil-WinRm Execution - PowerShell Module

Detects the execution of Evil-WinRM via PowerShell Module logs by leveraging the hardcoded strings inside the utility.

Sigmahigh

HackTool - F-Secure C3 Load by Rundll32

F-Secure C3 produces DLLs with a default exported StartNodeRelay function.

T1218.011
Sigmacritical
PreviousPage 36 of 136Next