EXPLORE

EXPLORE DETECTIONS

🔍
3,252 detections found

HackTool - NPPSpy Hacktool Usage

Detects the use of NPPSpy hacktool that stores cleartext passwords of users that logged in to a local file

Sigmahigh

HackTool - PCHunter Execution

Detects suspicious use of PCHunter, a tool like Process Hacker to view and manipulate processes, kernel options and other low level stuff

T1082T1057T1012T1083T1007
Sigmahigh

HackTool - Potential CobaltStrike Process Injection

Detects a potential remote threat creation with certain characteristics which are typical for Cobalt Strike beacons

T1055.001
Sigmahigh

HackTool - Potential Impacket Lateral Movement Activity

Detects wmiexec/dcomexec/atexec/smbexec from Impacket framework

T1047T1021.003
Sigmahigh

HackTool - Potential Remote Credential Dumping Activity Via CrackMapExec Or Impacket-Secretsdump

Detects default filenames output from the execution of CrackMapExec and Impacket-secretsdump against an endpoint.

T1003
Sigmahigh

HackTool - PowerTool Execution

Detects the execution of the tool PowerTool which has the ability to kill a process, delete its process file, unload drivers, and delete the driver files

T1562.001
Sigmahigh

HackTool - Powerup Write Hijack DLL

Powerup tool's Write Hijack DLL exploits DLL hijacking for privilege escalation. In it's default mode, it builds a self deleting .bat file which executes malicious command. The detection rule relies on creation of the malicious bat file (debug.bat by default).

T1574.001
Sigmahigh

HackTool - PPID Spoofing SelectMyParent Tool Execution

Detects the use of parent process ID spoofing tools like Didier Stevens tool SelectMyParent

T1134.004
Sigmahigh

HackTool - PurpleSharp Execution

Detects the execution of the PurpleSharp adversary simulation tool

T1587
Sigmacritical

HackTool - Pypykatz Credentials Dumping Activity

Detects the usage of "pypykatz" to obtain stored credentials. Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database through Windows registry where the SAM database is stored

T1003.002
Sigmahigh

HackTool - Quarks PwDump Execution

Detects usage of the Quarks PwDump tool via commandline arguments

T1003.002
Sigmahigh

HackTool - QuarksPwDump Dump File

Detects a dump file written by QuarksPwDump password dumper

T1003.002
Sigmacritical

HackTool - RedMimicry Winnti Playbook Execution

Detects actions caused by the RedMimicry Winnti playbook a automated breach emulations utility

T1106T1059.003T1218.011
Sigmahigh

HackTool - RemoteKrbRelay Execution

Detects the use of RemoteKrbRelay, a Kerberos relaying tool via CommandLine flags and PE metadata.

T1558.003
Sigmahigh

HackTool - RemoteKrbRelay SMB Relay Secrets Dump Module Indicators

Detects the creation of file with specific names used by RemoteKrbRelay SMB Relay attack module.

T1219.002
Sigmahigh

HackTool - Rubeus Execution

Detects the execution of the hacktool Rubeus via PE information of command line parameters

T1003T1558.003T1550.003
Sigmacritical

HackTool - Rubeus Execution - ScriptBlock

Detects the execution of the hacktool Rubeus using specific command line flags

T1003T1558.003T1550.003
Sigmahigh

HackTool - SafetyKatz Dump Indicator

Detects default lsass dump filename generated by SafetyKatz.

T1003.001
Sigmahigh

HackTool - SafetyKatz Execution

Detects the execution of the hacktool SafetyKatz via PE information and default Image name

T1003.001
Sigmacritical

HackTool - SecurityXploded Execution

Detects the execution of SecurityXploded Tools

T1555
Sigmacritical

HackTool - SharpChisel Execution

Detects usage of the Sharp Chisel via the commandline arguments

T1090.001
Sigmahigh

HackTool - SharpDPAPI Execution

Detects the execution of the SharpDPAPI tool based on CommandLine flags and PE metadata. SharpDPAPI is a C# port of some DPAPI functionality from the Mimikatz project.

T1134.001T1134.003
Sigmahigh

HackTool - SharPersist Execution

Detects the execution of the hacktool SharPersist - used to deploy various different kinds of persistence mechanisms

T1053
Sigmahigh

HackTool - SharpEvtMute DLL Load

Detects the load of EvtMuteHook.dll, a key component of SharpEvtHook, a tool that tampers with the Windows event logs

T1562.002
Sigmahigh
PreviousPage 38 of 136Next