EXPLORE

EXPLORE DETECTIONS

🔍
3,252 detections found

Microsoft Malware Protection Engine Crash - WER

This rule detects a suspicious crash of the Microsoft Malware Protection Engine

T1211T1562.001
Sigmahigh

Microsoft Office DLL Sideload

Detects DLL sideloading of DLLs that are part of Microsoft Office from non standard location

T1574.001
Sigmahigh

Microsoft Office Protected View Disabled

Detects changes to Microsoft Office protected view registry keys with which the attacker disables this feature.

T1562.001
Sigmahigh

Microsoft Office Trusted Location Updated

Detects changes to the registry keys related to "Trusted Location" of Microsoft Office. Attackers might add additional trusted locations to avoid macro security restrictions.

T1112
Sigmamedium

Microsoft Sync Center Suspicious Network Connections

Detects suspicious connections from Microsoft Sync Center to non-private IPs.

T1055T1218
Sigmamedium

Microsoft Teams Sensitive File Access By Uncommon Applications

Detects file access attempts to sensitive Microsoft teams files (leveldb, cookies) by an uncommon process.

T1528
Sigmamedium

Microsoft VBA For Outlook Addin Loaded Via Outlook

Detects outlvba (Microsoft VBA for Outlook Addin) DLL being loaded by the outlook process

T1204.002
Sigmamedium

Microsoft Word Add-In Loaded

Detects Microsoft Word loading an Add-In (.wll) file which can be used by threat actors for initial access or persistence.

T1204.002
Sigmalow

Microsoft Workflow Compiler Execution

Detects the execution of Microsoft Workflow Compiler, which may permit the execution of arbitrary unsigned code.

T1127T1218
Sigmamedium

Mimikatz DC Sync

Detects Mimikatz DC sync security events

S0002T1003.006
Sigmahigh

Mimikatz Use

This method detects mimikatz keywords in different Eventlogs (some of them only appear in older Mimikatz version that are however still used by different threat groups)

S0002T1003.002T1003.004T1003.001T1003.006
Sigmahigh

MITRE BZAR Indicators for Execution

Windows DCE-RPC functions which indicate an execution techniques on the remote system. All credit for the Zeek mapping of the suspicious endpoint/operation field goes to MITRE

T1047T1053.002T1569.002
Sigmamedium

MITRE BZAR Indicators for Persistence

Windows DCE-RPC functions which indicate a persistence techniques on the remote system. All credit for the Zeek mapping of the suspicious endpoint/operation field goes to MITRE.

T1547.004
Sigmamedium

MMC Executing Files with Reversed Extensions Using RTLO Abuse

Detects malicious behavior where the MMC utility (`mmc.exe`) executes files with reversed extensions caused by Right-to-Left Override (RLO) abuse, disguising them as document formats.

T1204.002T1218.014T1036.002
Sigmahigh

MMC Loading Script Engines DLLs

Detects when the Microsoft Management Console (MMC) loads the DLL libraries like vbscript, jscript etc which might indicate an attempt to execute malicious scripts within a trusted system process for bypassing application whitelisting or defense evasion.

T1059.005T1218.014
Sigmamedium

MMC Spawning Windows Shell

Detects a Windows command line executable started from MMC

T1021.003
Sigmahigh

MMC20 Lateral Movement

Detects MMC20.Application Lateral Movement; specifically looks for the spawning of the parent MMC.exe with a command line of "-Embedding" as a child of svchost.exe

T1021.003
Sigmahigh

Modification of IE Registry Settings

Detects modification of the registry settings used for Internet Explorer and other Windows components that use these settings. An attacker can abuse this registry key to add a domain to the trusted sites Zone or insert JavaScript for persistence

T1112
Sigmalow

Modification of ld.so.preload

Identifies modification of ld.so.preload for shared object injection. This technique is used by attackers to load arbitrary code into processes.

T1574.006
Sigmahigh

Modification or Deletion of an AWS RDS Cluster

Detects modifications to an RDS cluster or its deletion, which may indicate potential data exfiltration attempts, unauthorized access, or exposure of sensitive information.

T1020
Sigmahigh

Modify Group Policy Settings

Detect malicious GPO modifications can be used to implement many other malicious behaviors.

T1484.001
Sigmamedium

Modify Group Policy Settings - ScriptBlockLogging

Detect malicious GPO modifications can be used to implement many other malicious behaviors.

T1484.001
Sigmamedium

Modify System Firewall

Detects the removal of system firewall rules. Adversaries may only delete or modify a specific system firewall rule to bypass controls limiting network usage or access. Detection rules that match only on the disabling of firewalls will miss this.

T1562.004
Sigmamedium

Modify User Shell Folders Startup Value

Detect modification of the User Shell Folders registry values for Startup or Common Startup which could indicate persistence attempts. Attackers may modify User Shell Folders registry keys to point to malicious executables or scripts that will be executed during startup. This technique is often used to maintain persistence on a compromised system by ensuring that the malicious payload is executed automatically.

T1547.001
Sigmahigh
PreviousPage 52 of 136Next