EXPLORE

EXPLORE DETECTIONS

🔍
3,252 detections found

MacOS Scripting Interpreter AppleScript

Detects execution of AppleScript of the macOS scripting language AppleScript.

T1059.002
Sigmamedium

Macro Enabled In A Potentially Suspicious Document

Detects registry changes to Office trust records where the path is located in a potentially suspicious location

T1112
Sigmahigh

Mail Forwarding/Redirecting Activity In O365

Detects email forwarding or redirecting activity in O365 Audit logs.

T1114.003T1564.008T1020
Sigmamedium

Mail Forwarding/Redirecting Activity Via ExchangePowerShell Cmdlet

Detects email forwarding or redirecting activity via ExchangePowerShell Cmdlet

T1114.003T1564.008T1020
Sigmamedium

Mailbox Export to Exchange Webserver

Detects a successful export of an Exchange mailbox to untypical directory or with aspx name suffix which can be used to place a webshell or the needed role assignment for it

T1505.003
Sigmacritical

Malicious Base64 Encoded PowerShell Keywords in Command Lines

Detects base64 encoded strings used in hidden malicious PowerShell command lines

T1059.001
Sigmahigh

Malicious DLL File Dropped in the Teams or OneDrive Folder

Detects creation of a malicious DLL file in the location where the OneDrive or Team applications Upon execution of the Teams or OneDrive application, the dropped malicious DLL file ("iphlpapi.dll") is sideloaded

T1574.001
Sigmahigh

Malicious Driver Load

Detects loading of known malicious drivers via their hash.

T1543.003T1068
Sigmahigh

Malicious Driver Load By Name

Detects loading of known malicious drivers via the file name of the drivers.

T1543.003T1068
Sigmamedium

Malicious IP Address Sign-In Failure Rate

Indicates sign-in from a malicious IP address based on high failure rates.

T1090
Sigmahigh

Malicious IP Address Sign-In Suspicious

Indicates sign-in from a malicious IP address known to be malicious at time of sign-in.

T1090
Sigmahigh

Malicious Named Pipe Created

Detects the creation of a named pipe seen used by known APTs or malware.

T1055
Sigmacritical

Malicious Nishang PowerShell Commandlets

Detects Commandlet names and arguments from the Nishang exploitation framework

T1059.001
Sigmahigh

Malicious PE Execution by Microsoft Visual Studio Debugger

There is an option for a MS VS Just-In-Time Debugger "vsjitdebugger.exe" to launch specified executable and attach a debugger. This option may be used adversaries to execute malicious code by signed verified binary. The debugger is installed alongside with Microsoft Visual Studio package.

T1218
Sigmamedium

Malicious PowerShell Commandlets - PoshModule

Detects Commandlet names from well-known PowerShell exploitation frameworks

T1482T1087T1087.001T1087.002T1069.001+3
Sigmahigh

Malicious PowerShell Commandlets - ProcessCreation

Detects Commandlet names from well-known PowerShell exploitation frameworks

T1482T1087T1087.001T1087.002T1069.001+3
Sigmahigh

Malicious PowerShell Commandlets - ScriptBlock

Detects Commandlet names from well-known PowerShell exploitation frameworks

T1482T1087T1087.001T1087.002T1069.001+3
Sigmahigh

Malicious PowerShell Keywords

Detects keywords from well-known PowerShell exploitation frameworks

T1059.001
Sigmamedium

Malicious PowerShell Scripts - FileCreation

Detects the creation of known offensive powershell scripts used for exploitation

T1059.001
Sigmahigh

Malicious PowerShell Scripts - PoshModule

Detects the execution of known offensive powershell scripts used for exploitation or reconnaissance

T1059.001
Sigmahigh

Malicious ShellIntel PowerShell Commandlets

Detects Commandlet names from ShellIntel exploitation scripts.

T1059.001
Sigmahigh

Malicious Usage Of IMDS Credentials Outside Of AWS Infrastructure

Detects when an instance identity has taken an action that isn't inside SSM. This can indicate that a compromised EC2 instance is being used as a pivot point.

T1078T1078.002
Sigmahigh

Malicious Windows Script Components File Execution by TAEF Detection

Windows Test Authoring and Execution Framework (TAEF) framework allows you to run automation by executing tests files written on different languages (C, C#, Microsoft COM Scripting interfaces Adversaries may execute malicious code (such as WSC file with VBScript, dll and so on) directly by running te.exe

T1218
Sigmalow

Malware User Agent

Detects suspicious user agent strings used by malware in proxy logs

T1071.001
Sigmahigh
PreviousPage 50 of 136Next