EXPLORE

EXPLORE DETECTIONS

🔍
3,252 detections found

Import PowerShell Modules From Suspicious Directories - ProcCreation

Detects powershell scripts that import modules from suspicious directories

T1059.001
Sigmamedium

Important Scheduled Task Deleted

Detects when adversaries try to stop system services or processes by deleting their respective scheduled tasks in order to conduct data destructive activities

T1489
Sigmahigh

Important Scheduled Task Deleted/Disabled

Detects when adversaries stop services or processes by deleting or disabling their respective scheduled tasks in order to conduct data destructive activities

T1053.005
Sigmahigh

Important Windows Event Auditing Disabled

Detects scenarios where system auditing for important events such as "Process Creation" or "Logon" events is disabled.

T1562.002
Sigmahigh

Important Windows Eventlog Cleared

Detects the clearing of one of the Windows Core Eventlogs. e.g. caused by "wevtutil cl" command execution

T1070.001
Sigmahigh

Important Windows Service Terminated Unexpectedly

Detects important or interesting Windows services that got terminated unexpectedly.

Sigmahigh

Important Windows Service Terminated With Error

Detects important or interesting Windows services that got terminated for whatever reason

Sigmahigh

Imports Registry Key From a File

Detects the import of the specified file to the registry with regedit.exe.

T1112
Sigmamedium

Imports Registry Key From an ADS

Detects the import of a alternate datastream to the registry with regedit.exe.

T1112
Sigmahigh

Impossible Travel

Identifies user activities originating from geographically distant locations within a time period shorter than the time it takes to travel from the first location to the second.

T1078
Sigmahigh

Inbox Rules Creation Or Update Activity in O365

Detects inbox rule creation or update via O365 Audit logs, a technique commonly observed in Business Email Compromise (BEC) attacks to hide emails. The usage of inbox rules can be a sign of a compromised mailbox, where an attacker is attempting to evade detections by suppressing or redirecting incoming emails. Analysts should review these rules in context, validate whether they reflect normal user behavior, and correlate with other indicators such as unusual login activity or recent mailbox rule modifications.

T1564.008T1114.003
Sigmamedium

Inbox Rules Creation Or Update Activity Via ExchangePowerShell Cmdlet

Detects inbox rule creation or update via ExchangePowerShell cmdlet, a technique commonly observed in Business Email Compromise (BEC) attacks to hide emails. The usage of inbox rules can be a sign of a compromised mailbox, where an attacker is attempting to evade detections by suppressing or redirecting incoming emails. Analysts should review these rules in context, validate whether they reflect normal user behavior, and correlate with other indicators such as unusual login activity or recent mailbox rule modifications.

T1564.008T1114.003
Sigmamedium

Increased Failed Authentications Of Any Type

Detects when sign-ins increased by 10% or greater.

T1078
Sigmamedium

Indicator Removal on Host - Clear Mac System Logs

Detects deletion of local audit logs

T1070.002
Sigmamedium

Indirect Command Execution By Program Compatibility Wizard

Detect indirect command execution via Program Compatibility Assistant pcwrun.exe

T1218
Sigmalow

Indirect Command Execution From Script File Via Bash.EXE

Detects execution of Microsoft bash launcher without any flags to execute the content of a bash script directly. This can be used to potentially bypass defenses and execute Linux or Windows-based binaries directly via bash.

T1202
Sigmamedium

Indirect Inline Command Execution Via Bash.EXE

Detects execution of Microsoft bash launcher with the "-c" flag. This can be used to potentially bypass defenses and execute Linux or Windows-based binaries directly via bash.

T1202
Sigmamedium

InfDefaultInstall.exe .inf Execution

Executes SCT script using scrobj.dll from a command in entered into a specially prepared INF file.

T1218
Sigmamedium

Ingress/Egress Security Group Modification

Detects when an account makes changes to the ingress or egress rules of a security group. This can indicate that an attacker is attempting to open up new attack vectors in the account, that they are trying to exfiltrate data over the network, or that they are trying to allow machines in that VPC/Subnet to contact a C&C server.

T1190
Sigmamedium

Inline Python Execution - Spawn Shell Via OS System Library

Detects execution of inline Python code via the "-c" in order to call the "system" function from the "os" library, and spawn a shell.

T1059
Sigmahigh

Insecure Proxy/DOH Transfer Via Curl.EXE

Detects execution of "curl.exe" with the "insecure" flag over proxy or DOH.

Sigmamedium

Insecure Transfer Via Curl.EXE

Detects execution of "curl.exe" with the "--insecure" flag.

Sigmamedium

Insensitive Subfolder Search Via Findstr.EXE

Detects execution of findstr with the "s" and "i" flags for a "subfolder" and "insensitive" search respectively. Attackers sometimes leverage this built-in utility to search the system for interesting files or filter through results of commands.

T1218T1564.004T1552.001T1105
Sigmalow

Install New Package Via Winget Local Manifest

Detects usage of winget to install applications via manifest file. Adversaries can abuse winget to download payloads remotely and execute them. The manifest option enables you to install an application by passing in a YAML file directly to the client. Winget can be used to download and install exe, msi or msix files later.

T1059
Sigmamedium
PreviousPage 42 of 136Next