EXPLORE

EXPLORE DETECTIONS

🔍
3,252 detections found

Modifying Crontab

Detects suspicious modification of crontab file.

T1053.003
Sigmamedium

Monero Crypto Coin Mining Pool Lookup

Detects suspicious DNS queries to Monero mining pools

T1496T1567
Sigmahigh

Monitoring For Persistence Via BITS

BITS will allow you to schedule a command to execute after a successful download to notify you that the job is finished. When the job runs on the system the command specified in the BITS job will be executed. This can be abused by actors to create a backdoor within the system and for persistence. It will be chained in a BITS job to schedule the download of malware/additional binaries and execute the program after being downloaded.

T1197
Sigmamedium

Moriya Rootkit - System

Detects the use of Moriya rootkit as described in the securelist's Operation TunnelSnake report

T1543.003
Sigmacritical

Mount Execution With Hidepid Parameter

Detects execution of the "mount" command with "hidepid" parameter to make invisible processes to other users from the system

T1564
Sigmamedium

MpiExec Lolbin

Detects a certain command line flag combination used by mpiexec.exe LOLBIN from HPC pack that can be used to execute any other binary

T1218
Sigmahigh

MSDT Execution Via Answer File

Detects execution of "msdt.exe" using an answer file which is simulating the legitimate way of calling msdt via "pcwrun.exe" (For example from the compatibility tab).

T1218
Sigmahigh

MSExchange Transport Agent Installation

Detects the Installation of a Exchange Transport Agent

T1505.002
Sigmamedium

MSExchange Transport Agent Installation - Builtin

Detects the Installation of a Exchange Transport Agent

T1505.002
Sigmamedium

MSHTA Execution with Suspicious File Extensions

Detects execution of mshta.exe with file types that looks like they do not typically represent HTA (HTML Application) content, such as .png, .jpg, .zip, .pdf, and others, which are often polyglots. MSHTA is a legitimate Windows utility for executing HTML Applications containing VBScript or JScript. Threat actors often abuse this lolbin utility to download and execute malicious scripts disguised as benign files or hosted under misleading extensions to evade detection.

T1140T1218.005T1059.007
Sigmahigh

Mshtml.DLL RunHTMLApplication Suspicious Usage

Detects execution of commands that leverage the "mshtml.dll" RunHTMLApplication export to run arbitrary code via different protocol handlers (vbscript, javascript, file, http...)

Sigmahigh

MSI Installation From Suspicious Locations

Detects MSI package installation from suspicious locations

Sigmamedium

MSI Installation From Web

Detects installation of a remote msi file from web.

T1218T1218.007
Sigmamedium

Msiexec Quiet Installation

Adversaries may abuse msiexec.exe to proxy execution of malicious payloads. Msiexec.exe is the command-line utility for the Windows Installer and is thus commonly associated with executing installation packages (.msi)

T1218.007
Sigmamedium

MsiExec Web Install

Detects suspicious msiexec process starts with web addresses as parameter

T1218.007T1105
Sigmamedium

Msiexec.EXE Initiated Network Connection Over HTTP

Detects a network connection initiated by an "Msiexec.exe" process over port 80 or 443. Adversaries might abuse "msiexec.exe" to install and execute remotely hosted packages. Use this rule to hunt for potentially anomalous or suspicious communications.

T1218.007
Sigmalow

MSSQL Add Account To Sysadmin Role

Detects when an attacker tries to backdoor the MSSQL server by adding a backdoor account to the sysadmin fixed server role

Sigmahigh

MSSQL Destructive Query

Detects the invocation of MS SQL transactions that are destructive towards table or database data, such as "DROP TABLE" or "DROP DATABASE".

T1485
Sigmamedium

MSSQL Disable Audit Settings

Detects when an attacker calls the "ALTER SERVER AUDIT" or "DROP SERVER AUDIT" transaction in order to delete or disable audit logs on the server

Sigmahigh

MSSQL Server Failed Logon

Detects failed logon attempts from clients to MSSQL server.

T1110
Sigmalow

MSSQL Server Failed Logon From External Network

Detects failed logon attempts from clients with external network IP to an MSSQL server. This can be a sign of a bruteforce attack.

T1110
Sigmamedium

MSSQL SPProcoption Set

Detects when the a stored procedure is set or cleared for automatic execution in MSSQL. A stored procedure that is set to automatic execution runs every time an instance of SQL Server is started

Sigmahigh

MSSQL XPCmdshell Option Change

Detects when the MSSQL "xp_cmdshell" stored procedure setting is changed.

Sigmahigh

MSSQL XPCmdshell Suspicious Execution

Detects when the MSSQL "xp_cmdshell" stored procedure is used to execute commands

Sigmahigh
PreviousPage 53 of 136Next